Articles de revues sur le sujet « Software risk assessment »

Pour voir les autres types de publications sur ce sujet consultez le lien suivant : Software risk assessment.

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les 50 meilleurs articles de revues pour votre recherche sur le sujet « Software risk assessment ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Parcourez les articles de revues sur diverses disciplines et organisez correctement votre bibliographie.

1

Greene, N. « Computer Software for Risk Assessment ». Journal of Chemical Information and Computer Sciences 37, no 1 (janvier 1997) : 148–50. http://dx.doi.org/10.1021/ci960095h.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Chen, Xingyuan, et Yong Deng. « An Evidential Software Risk Evaluation Model ». Mathematics 10, no 13 (2 juillet 2022) : 2325. http://dx.doi.org/10.3390/math10132325.

Texte intégral
Résumé :
Software risk management is an important factor in ensuring software quality. Therefore, software risk assessment has become a significant and challenging research area. The aim of this study is to establish a data-driven software risk assessment model named DDERM. In the proposed model, experts’ risk assessments of probability and severity can be transformed into basic probability assignments (BPAs). Deng entropy was used to measure the uncertainty of the evaluation and to calculate the criteria weights given by experts. In addition, the adjusted BPAs were fused using the rules of Dempster–Shafer evidence theory (DST). Finally, a risk matrix was used to get the risk priority. A case application demonstrates the effectiveness of the proposed method. The proposed risk modeling framework is a novel approach that provides a rational assessment structure for imprecision in software risk and is applicable to solving similar risk management problems in other domains.
Styles APA, Harvard, Vancouver, ISO, etc.
3

Ammar, H. H., T. Nikzadeh et J. B. Dugan. « Risk assessment of software-system specifications ». IEEE Transactions on Reliability 50, no 2 (juin 2001) : 171–83. http://dx.doi.org/10.1109/24.963125.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Hyatt, Lawrence E., et Linda H. Rosenberg. « Software metrics program for risk assessment ». Acta Astronautica 40, no 2-8 (janvier 1997) : 223–33. http://dx.doi.org/10.1016/s0094-5765(97)00148-3.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Xu Jian, Yan Han et Li Qianmu. « A Methodology for Software Reliability Risk Assessment ». Journal of Convergence Information Technology 6, no 4 (30 avril 2011) : 188–200. http://dx.doi.org/10.4156/jcit.vol6.issue4.22.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Chittister, C., et Y. Y. Haimes. « Assessment and management of software technical risk ». IEEE Transactions on Systems, Man, and Cybernetics 24, no 2 (1994) : 187–202. http://dx.doi.org/10.1109/21.281419.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Barki, Henri, Suzanne Rivard et Jean Talbot. « Toward an Assessment of Software Development Risk ». Journal of Management Information Systems 10, no 2 (septembre 1993) : 203–25. http://dx.doi.org/10.1080/07421222.1993.11518006.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Funieru, Cristian, et Răzvan Funieru. « Caries Risk software – a new tool used for children caries risk assessment ». Romanian Journal of Stomatology 61, no 2 (30 juin 2015) : 179–82. http://dx.doi.org/10.37897/rjs.2015.2.13.

Texte intégral
Résumé :
Introduction. Dental caries risk is a key factor which may influence dental health in the near future. It is a very important factor for developing individual or community preventive strategies. Material and method. 46 dental records were analyzed including data of caries baseline and caries risk factors in a group of 46 schoolchildren from city of Bucharest. The overall caries risk was estimated using version 1.0 of Caries Risk software, the first software designed and calibrated to provide caries risk for Romanian patients. Results. The caries risk was approximately 40% in our sample. The girls had a higher risk by about 13% compared to boys. Conclusions. Caries Risk software is an effective tool for estimating caries risk by having an easy mode for input data and a short time needed for processing.
Styles APA, Harvard, Vancouver, ISO, etc.
9

Taylor, David, Derek Williamson, Harprit Kaur, Kevin Macintosh, Leo Brewster et Ramon Roach. « BARBADOS NATIONAL COASTAL RISK INFORMATION AND PLANNING PLATFORM A SOFTWARE SYSTEM FOR HAZARDS, VULNERABILITY & ; RISK ». Coastal Engineering Proceedings, no 36 (30 décembre 2018) : 55. http://dx.doi.org/10.9753/icce.v36.risk.55.

Texte intégral
Résumé :
The Barbados National Coastal Risk Information and Planning Platform (NCRIPP) is a study nearing completion to quantify coastal risk and develop a software system to serve this information country-wide. The NCRIPP follows extensive coastal baseline studies and includes assessment of eight hazards, vulnerability assessment and finally a risk assessment. The software platform is a cloud-based system that includes a large catalogue of assets, hazard overlays, and the ability to calculate damages , and mitigation alternatives.
Styles APA, Harvard, Vancouver, ISO, etc.
10

Kumar, Chandan, et Dilip Kumar Yadav. « A Probabilistic Software Risk Assessment and Estimation Model for Software Projects ». Procedia Computer Science 54 (2015) : 353–61. http://dx.doi.org/10.1016/j.procs.2015.06.041.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
11

BIFFL, STEFAN, THOMAS MOSER et DIETMAR WINKLER. « RISK ASSESSMENT IN MULTI-DISCIPLINARY (SOFTWARE+) ENGINEERING PROJECTS ». International Journal of Software Engineering and Knowledge Engineering 21, no 02 (mars 2011) : 211–36. http://dx.doi.org/10.1142/s0218194011005232.

Texte intégral
Résumé :
Software systems in safety-critical industrial automation systems, such as power plants and steel mills, become increasingly large, complex, and distributed. For assessing risks, like low product quality and project cost and duration overruns, to trustworthy services provided by software as part of automation systems there are established risk analysis approaches based on data collection from project participants and data models. However, in multi-disciplinary engineering projects there are often semantic gaps between the software tools and data models of the participating engineering disciplines, e.g., mechanic, electrical, and software engineering. In this paper we discuss current limitations to risk assessment in (software+) engineering projects and introduce the SEMRISK approach for risk assessment in projects with semantically heterogeneous software tools and data models. The SEMRISK approach provides the knowledge engineering foundation to allow an end-to-end view for service-relevant data elements such as signals, by providing a project domain ontology and mappings to the tool data models of the involved engineering disciplines. We empirically evaluate the effectiveness and efficiency of the approach based on a real-world industrial use case from the safety-critical power plant domain. Major results are that the approach was effective and considerably more efficient than the current approach at the industry partner.
Styles APA, Harvard, Vancouver, ISO, etc.
12

Joó, József Gábor, Mónika Csanád, Katalin Tóth, Szabolcs Máté et Zsolt Nagy. « Risk assessment in familial breast cancer ». Orvosi Hetilap 152, no 19 (mai 2011) : 758–62. http://dx.doi.org/10.1556/oh.2011.29110.

Texte intégral
Résumé :
Women with a history of breast cancer are common at centers for cancer genetic risk all over Europe. Given limited health care resources, managing this demand, while achieving good value for money coming from health services, is generally a major challenge. This paper recapitulates and summarizes the available methods of the risk assessment of familial breast cancer. After a systematic review of the literature Gail-model, Claus-model and BOADICEA-model were selected, as well as softwares (LINKAGE software; MENDEL v3.3 software) available in the application of these algorhythms are also summarized. Comparisons were made between the models concerning their advantages and disadvantages. The really reliable methods of risk estimation of familial breast cancer are always based on the analysis of the pedigree structure and allow the estimation of the patient’s probability of carrying a susceptibility gene under a particular genetic model, given her family history. For this method the knowledge of BRCA mutation status is absolutely indispensable. The methods of BRCA mutation analysis as well as the main characteristics of the occurrence of BRCA mutation carrier condition are discussed in details. Orv. Hetil., 2011, 152, 758–762.
Styles APA, Harvard, Vancouver, ISO, etc.
13

BARMAK, ALEXANDER, VIKTOR KUDRIAVTSEV, YRII FORKUN et OKSANA YASHYNA. « SOFTWARE CODE ANALYSIS SYSTEM FOR RISK ASSESSMENT AND QUALITY ASSURANCE OF SOFTWARE ». HERALD OF KHMELNYTSKYI NATIONAL UNIVERSITY 297, no 3 (2 juillet 2021) : 25–29. http://dx.doi.org/10.31891/2307-5732-2021-297-3-25-29.

Texte intégral
Résumé :
The paper presents the results of research of various standards, rules and methods of writing software code and analysis of their impact on software quality and the likelihood of technical risks associated with information processes within the system. Most of the risks that arise while developing software products are due to errors in building the system architecture or writing code. As a solution for such problems, it is proposed to apply the developed set of rules and methods to build the system architecture and assess the quality of writing software objects. Metrics have been developed to estimate the size and complexity of the module by combining elements of Halsted and Chepin metrics. Also, a set of principles for optimizing the structure of the system, also known as SOLID principles, was presented. The application of these principles for system construction and analysis was substantiated in order to minimize risks, ensure the quality of the software system and provide opportunities for easy extensibility of the project. Using these methods will optimize the project both for use and for further development. The need for such optimization processes in terms of risk management is that the clearer the system and the easier it is to expand, the less likely it is that errors will occur in the future when adding new functionality.
Styles APA, Harvard, Vancouver, ISO, etc.
14

Nagamalleswari, D., J. Nagalakshmi, G. Karthik et P. Harthita. « A study on risk assessment techniques in information systems ». International Journal of Engineering & ; Technology 7, no 1.1 (21 décembre 2017) : 313. http://dx.doi.org/10.14419/ijet.v7i1.1.9711.

Texte intégral
Résumé :
In today’s world, IT industry is rushing forward with an advancement of developing the advanced software. The Developers always try to develop the software projects without any errors or failures. Even though the developers take many measures to avoid software project failures, they are facing the failures that are occurred due to Risks that take place in the software projects. We cannot remove risk completely to the 100% extent, but we can try to minimize the risk in the projects by assessing the risks. So, in this paper we are providing a survey which overviews on different risk assessment techniques. This survey provides information about various risk assessment techniques which will be further useful for the software developers to minimize the risk and make the successful project.
Styles APA, Harvard, Vancouver, ISO, etc.
15

Kang, Hyun Gook, Heung-Seop Eom et Han Seong Son. « Software Failure Probability Quantification for System Risk Assessment ». Scholarly Research Exchange 2009 (2009) : 1–9. http://dx.doi.org/10.3814/2009/163456.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
16

Huff, Philip, et Qinghua Li. « Towards Automating the Assessment of Software Vulnerability Risk ». ICST Transactions on Security and Safety 8, no 27 (12 janvier 2021) : 170247. http://dx.doi.org/10.4108/eai.25-6-2021.170247.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
17

Saveliev, D. V. « Risk Management and Assessment in Software Development Projects ». Èlektronnoe modelirovanie 43, no 4 (2 août 2021) : 113–24. http://dx.doi.org/10.15407/emodel.43.04.113.

Texte intégral
Résumé :
The article defines the concept of threat model. Described a list of current security guidelines for the development and administration of web systems. Formed the list of cybersecurity threats, the consequences of their implementation are determined. Described the process of forming a model of cybersecurity threats of web systems. Defined the list of threats based on the recommendations and experience of authoritative organizations in the world and Ukraine. Defined the concepts of risk, risk index and risk status for the security of web systems. Defined the main principles of risk management in software development projects.
Styles APA, Harvard, Vancouver, ISO, etc.
18

Ni, M., J. D. McCalley, V. Vittal, S. Greene, C. W. Ten, V. S. Ganugula et T. Tayyib. « Software Implementation of Online Risk-Based Security Assessment ». IEEE Power Engineering Review 22, no 11 (novembre 2002) : 59. http://dx.doi.org/10.1109/mper.2002.4311833.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
19

Novakovic, Zoran, et Zoran Milojevic. « Software package for risk assessment in the workplace ». Vojnotehnicki glasnik 56, no 2 (2008) : 217–26. http://dx.doi.org/10.5937/vojtehg0802217n.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
20

Ming Ni, J. D. McCalley, V. Vittal, S. Greene, C. Ten, V. S. Ganugula et T. Tayyib. « Software implementation of online risk-based security assessment ». IEEE Transactions on Power Systems 18, no 3 (août 2003) : 1165–72. http://dx.doi.org/10.1109/tpwrs.2003.814909.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
21

Moni, Mohammad, et Pietro Liò. « comoR : a software for disease comorbidity risk assessment ». Journal of Clinical Bioinformatics 4, no 1 (2014) : 8. http://dx.doi.org/10.1186/2043-9113-4-8.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
22

Lima, Ana Paula Souza, Tânia Couto Machado Chianca et Meire Chucre Tannure. « Assessment of nursing care using indicators generated by software ». Revista Latino-Americana de Enfermagem 23, no 2 (avril 2015) : 234–41. http://dx.doi.org/10.1590/0104-1169.0177.2547.

Texte intégral
Résumé :
OBJECTIVE: to analyze the efficacy of the Nursing Process in an Intensive Care Unit using indicators generated by software. METHOD: cross-sectional study using data collected for four months. RNs and students daily registered patients, took history (at admission), performed physical assessments, and established nursing diagnoses, nursing plans/prescriptions, and assessed care delivered to 17 patients using software. Indicators concerning the incidence and prevalence of nursing diagnoses, rate of effectiveness, risk diagnoses, and rate of effective prevention of complications were computed. RESULTS: the Risk for imbalanced body temperature was the most frequent diagnosis (23.53%), while the least frequent was Risk for constipation (0%). The Risk for Impaired skin integrity was prevalent in 100% of the patients, while Risk for acute confusion was the least prevalent (11.76%). Risk for constipation and Risk for impaired skin integrity obtained a rate of risk diagnostic effectiveness of 100%. The rate of effective prevention of acute confusion and falls was 100%. CONCLUSION: the efficacy of the Nursing Process using indicators was analyzed because these indicators reveal how nurses have identified patients' risks and conditions, and planned care in a systematized manner.
Styles APA, Harvard, Vancouver, ISO, etc.
23

Fryer, M. O. « Risk Assessment of Computer Controlled Systems ». IEEE Transactions on Software Engineering SE-11, no 1 (janvier 1985) : 125–29. http://dx.doi.org/10.1109/tse.1985.231849.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
24

Veevers, Alan. « Some issues in software reliability assessment ». Software Testing, Verification and Reliability 1, no 1 (1991) : 17–22. http://dx.doi.org/10.1002/stvr.4370010104.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
25

Dale, Chris. « The assessment of software reliability ». Reliability Engineering & ; System Safety 34, no 1 (janvier 1991) : 91–103. http://dx.doi.org/10.1016/0951-8320(91)90101-c.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
26

Lindermeier, Robert. « Quality assessment of software prototypes ». Reliability Engineering & ; System Safety 43, no 1 (janvier 1994) : 87–94. http://dx.doi.org/10.1016/0951-8320(94)90097-3.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
27

Chandani, Priyanka, et Chetna Gupta. « An Early Multi-Criteria Risk Assessment Model ». Journal of Cases on Information Technology 21, no 2 (avril 2019) : 51–64. http://dx.doi.org/10.4018/jcit.2019040104.

Texte intégral
Résumé :
Accurate time and budget is an essential estimate for planning software projects correctly. Quite often, the software projects fall into unrealistic estimates and the core reason generally owes to problems with the requirement analysis. For investigating such problems, risk has to identified and assessed at the requirement engineering phase only so that defects do not seep down to other software development phases. This article proposes a multi-criteria risk assessment model to compute risk at a requirement level by computing cumulative risk score based on a weighted score assigned to each criterion. The result of comparison with other approaches and experimentation shows that using this model it is possible to predict the risk at the early phase of software development life cycle with high accuracy.
Styles APA, Harvard, Vancouver, ISO, etc.
28

Zhu, Zhicheng, Kun Lan, Zhihong Rao et Yuguang Zhang. « Risk assessment method for IoT software supply chain vulnerabilities ». Journal of Physics : Conference Series 1732 (janvier 2021) : 012051. http://dx.doi.org/10.1088/1742-6596/1732/1/012051.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
29

Karari, Poojanjali, et Pooja Jain. « A Survey on Software Cost and Risk Assessment Models ». International Journal of Computer Applications 171, no 4 (17 août 2017) : 13–18. http://dx.doi.org/10.5120/ijca2017915016.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
30

Sambantha Moorthy, Jayaletchumi. « DEVELOPING USABLE SOFTWARE PRODUCT USING USABILITY RISK ASSESSMENT MODEL ». International Journal of Digital Information and Wireless Communications 4, no 1 (2014) : 95–102. http://dx.doi.org/10.17781/p001088.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
31

Joh, Hyun Chul. « Modeling Software Risk Assessment Based on Multi-Vulnerability Lifecycle ». International Review on Computers and Software (IRECOS) 11, no 2 (29 février 2016) : 116. http://dx.doi.org/10.15866/irecos.v11i2.8552.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
32

Joh, HyunChul, et JooYoung Lee. « Empirical Risk Assessment in Major Graphical Design Software Systems ». Journal of Multimedia Information System 8, no 4 (31 décembre 2021) : 259–66. http://dx.doi.org/10.33851/jmis.2021.8.4.259.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
33

JPT staff, _. « Software Application Optimizes Well-Planning and Risk-Assessment Process ». Journal of Petroleum Technology 56, no 02 (1 février 2004) : 26–80. http://dx.doi.org/10.2118/0204-0026-jpt.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
34

Gavanski, Dušan, Azra Korjenic et Verica Milanko. « Fire risk assessment in buildings using fire protection software ». International Journal of Risk Assessment and Management 17, no 1 (2013) : 1. http://dx.doi.org/10.1504/ijram.2013.054375.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
35

Peercy, D. E., M. D. Estill et K. L. Shaw. « Risk Assessment Methodology for Software Supportability (RAMSS) : User's handbook ». Computers & ; Security 7, no 5 (octobre 1988) : 510. http://dx.doi.org/10.1016/0167-4048(88)90211-8.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
36

Bowlds, Ted F., John M. Fossaceca et Ronald Iammartino. « Software obsolescence risk assessment approach using multicriteria decision-making ». Systems Engineering 21, no 5 (28 mai 2018) : 455–65. http://dx.doi.org/10.1002/sys.21446.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
37

Reece, Wendy J., et David I. Gertman. « NUCLARR : a workstation software package to support risk assessment ». Reliability Engineering & ; System Safety 37, no 2 (janvier 1992) : 173–78. http://dx.doi.org/10.1016/0951-8320(92)90011-9.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
38

Woolridge, Richard, Denise McManus et Joanne Hale. « Stakeholder Risk Assessment : An Outcome-Based Approach ». IEEE Software 24, no 2 (mars 2007) : 36–45. http://dx.doi.org/10.1109/ms.2007.54.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
39

Madachy, Raymond J. « Knowledge-based risk assessment and cost estimation ». Automated Software Engineering 2, no 3 (septembre 1995) : 219–30. http://dx.doi.org/10.1007/bf00871798.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
40

Nalbandyan, М. А., et А. О. Nersisyan. « Environmental Risk Assessment in the Masrik River Basin ». Agrology 4, no 2 (2021) : 71–76. http://dx.doi.org/10.32819/021009.

Texte intégral
Résumé :
The purpose of this study is to assess the environmental risks of water pollutionin the Masrik River catchment area. The risk assessment studies are based on the results of thehydrochemical monitoring of the Masrik River Basin water quality in 2012‒2014. The main riskfactors for pollution of the river basin area are mining, agriculture, uncontrolled utility flows.Zoning was performed and areas of zones were calculated using a digital elevation model (DEM)in the ArcGIS software environment and taking into account sampling points and river basins. Atthe same time, the territory was ranked by population density. Then a geodatabase (GDB) wascompiled. GDB presents the point assessments of the state of river waters according to the level ofthe pollutant concentration factor and population density. The thematic layers based on the resultsof the indicators in the ArcGIS program were compiled. A map was obtained according to a pointassessment of environmental risk. An integrated assessment of river water pollution was carriedout in different parts of the basin. The population density and total risk index were calculated. Thethree risk zones were identified in the river basin: high, medium and low. In addition to presentingtheoretical value, the conclusions are also of practical importance and can be used in the developmentof river basin risk management programs, measures for quality management and control ofpollution sources in the aread.
Styles APA, Harvard, Vancouver, ISO, etc.
41

Craigmyle, Mac, et Irwin Fletcher. « Improving IT effectiveness through software process assessment ». Software Quality Journal 2, no 4 (décembre 1993) : 257–64. http://dx.doi.org/10.1007/bf00403768.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
42

Aggarwal, Alankrita, Kanwalvir Singh Dhindsa et P. K. Suri. « A Pragmatic Assessment of Approaches and Paradigms in Software Risk Management Frameworks ». International Journal of Natural Computing Research 9, no 1 (janvier 2020) : 13–26. http://dx.doi.org/10.4018/ijncr.2020010102.

Texte intégral
Résumé :
Software risk management involves the process of prior recognition and the assessment of vulnerabilities with the classification approach so that the risk avoidance mechanism can be implemented. It includes one of the key factors in software project management with the goal to improve quality as well as the avoidance of vulnerabilities. The term defect refers to the imperfection that may arise because of reasons including programmers' skills, lack of suitable testing strategies, and many others. When there is difference in actual and expected result or meeting the wrong requirement it is called a defect and it forms the basis of risk escalation in the software project, which is obviously not accepted in any type of deployment. To make software reliable, the software should be risk-free from any type of vulnerability factor. Along with reliability, another issue that has arisen is software quality in which the associated factor is with software risk management. The quality of software is to reduce the occurrence of risks and defects with the objective to produce effective valued software.
Styles APA, Harvard, Vancouver, ISO, etc.
43

Marx, Ben, et Deon Oosthuizen. « Risk assessment and mitigation at the information technology companies ». Risk Governance and Control : Financial Markets and Institutions 6, no 2 (2016) : 44–51. http://dx.doi.org/10.22495/rcgv6i2art6.

Texte intégral
Résumé :
Developing computer software that is free from material defects is the ultimate goal for software developers; however, due to the cost and complexity of software development, it is a goal that is unlikely to be achieved. As a consequence of the inevitable defects that manifest within computer software, the task of software patch management becomes a key focus area for software companies, IT departments, and even end users. Audit departments, as part of their responsibilities, are required to provide assurance on the patching process and therefore need to understand the various decision-making factors. Software flaws that exist within computer systems may put confidential information at risk and may also compromise the availability of such systems. The study investigated the recommended approaches for the task of software patching, with a view to balancing the sometimes conflicting requirements of security and system availability. The study found that there are a number of key aspects that are required to ensure a successful patching process and that the internal auditors of the ‘big four’ South African banks considered most of these factors to be important.
Styles APA, Harvard, Vancouver, ISO, etc.
44

SCHNEIDEWIND, NORMAN. « APPLYING NEURAL NETWORKS TO SOFTWARE RELIABILITY ASSESSMENT ». International Journal of Reliability, Quality and Safety Engineering 17, no 04 (août 2010) : 313–29. http://dx.doi.org/10.1142/s0218539310003834.

Texte intégral
Résumé :
We adapt concepts from the field of neural networks to assess the reliability of software, employing cumulative failures, reliability, remaining failures, and time to failure metrics. In addition, the risk of not achieving reliability, remaining failure, and time to failure goals are assessed. The purpose of the assessment is to compare a criterion, derived from a neural network model, for estimating the parameters of software reliability metrics, with the method of maximum likelihood estimation. To our surprise the neural network method proved superior for all the reliability metrics that were assessed by virtue of yielding lower prediction error and risk. We also found that considerable adaptation of the neural network model was necessary to be meaningful for our application – only inputs, functions, neurons, weights, activation units, and outputs were required to characterize our application.
Styles APA, Harvard, Vancouver, ISO, etc.
45

Al-Rousan, Thamer. « Cloud Computing for Global Software Development ». International Journal of Cloud Applications and Computing 5, no 1 (janvier 2015) : 58–68. http://dx.doi.org/10.4018/ijcac.2015010105.

Texte intégral
Résumé :
The cloud computing paradigm offers an innovative and promising vision concerning Information and Communications Technology. Actually, it provides the possibility of improving IT systems management and is changing the way in which hardware and software are designed and purchased. This paper introduces challenges in Global Software Development (GSD) and application of cloud computing platforms as a solution to some problems. Even though cloud computing provides compelling benefits and cost-effective options for GSD, new risks and difficulties must be taken into account. Thus, the paper presents a study about the risk issues involved in cloud computing. It highlights the different types of risks and how their existence can affect GSD. It also proposes a new risk management process model. The risk model employs new processes for risk analysis and assessment. Its aim is to analyse cloud risks quantitatively and, consequently, prioritise them according to their impact on different GSD objectives.
Styles APA, Harvard, Vancouver, ISO, etc.
46

Pradhan, Padma Lochan. « Proposed Round Robin CIA Pattern on RTS for Risk Assessment ». International Journal of Digital Crime and Forensics 9, no 1 (janvier 2017) : 71–85. http://dx.doi.org/10.4018/ijdcf.2017010105.

Texte intégral
Résumé :
The preventive, detective and corrective control is well advanced automated control in order to attain the maximum objectives of preserving the CIA mechanism on RTS. The risk analysis is the process of identifying the risk on RTS to achieving business objectives and deciding the measure components of RTOS on optimizing the lowest level of risk. This proposed round robin mechanism is going to be implemented on RTOS and mean while providing actionable, accountable & measurable for individuals who are accessing sensitive information on multiple relation functions, operation and services (RFOS) on multiple resources of RTS. We have to develop the RRP for risk assessment on MIMD. This research work going to be applied into security pattern on the measure component of the system security as well as RTOS. Furthermore, this RRP optimize the cost, time & resources is supposed to optimize the system risks and maximize the performance of business, resource & technology all the time & every time.
Styles APA, Harvard, Vancouver, ISO, etc.
47

Thanwadee T. Sunetnanta, et Morakot Choetkiertikul. « Quantitative CMMI Assessment for Software Process Quality and Risk Monitoring in Software Process Improvement ». International Journal of Digital Content Technology and its Applications 6, no 21 (30 novembre 2012) : 95–102. http://dx.doi.org/10.4156/jdcta.vol6.issue21.11.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
48

Garvey, P. R., D. J. Phair et J. A. Wilson. « An Information Architecture For Risk Assessment And Management ». IEEE Software 14, no 3 (mai 1997) : 25–34. http://dx.doi.org/10.1109/ms.1997.589228.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
49

Bouquegneau, Christian. « The Risk Multilingual 3 Software : Applying the New Trends in Lightning Risk Assessment ». Journal of Lightning Research 4, no 1 (13 juillet 2012) : 129–32. http://dx.doi.org/10.2174/1652803401204010129.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
50

Jimoh, Rasheed Gbenga, Olayinka Olufunmilayo Olusanya, Joseph Bamidele Awotunde, Agbotiname Lucky Imoize et Cheng-Chi Lee. « Identification of Risk Factors Using ANFIS-Based Security Risk Assessment Model for SDLC Phases ». Future Internet 14, no 11 (26 octobre 2022) : 305. http://dx.doi.org/10.3390/fi14110305.

Texte intégral
Résumé :
In the field of software development, the efficient prioritizing of software risks was essential and play significant roles. However, finding a viable solution to this issue is a difficult challenge. The software developers have to adhere strictly to risk management practice because each phase of SDLC is faced with its individual type of risk rather than considering it as a general risk. Therefore, this study proposes an adaptive neuro-fuzzy inference system (ANFIS) for selection of appropriate risk factors in each stages of software development process. Existing studies viewed the SDLC’s Security risk assessment (SRA) as a single integrated process that did not offer a thorough SRA at each stage of the SDLC process, which resulted in unsecure software development. Hence, this study identify and validate the risk factors needed for assessing security risk at each phase of SDLC. For each phase, an SRA model based on an ANFIS was suggested, using the identified risk factors as inputs. For the logical representation of the fuzzification as an input and output variables of the SRA risk factors for the ANFIS-based model employing the triangular membership functions. The proposed model utilized two triangular membership functions to represent each risk factor’s label, while four membership functions were used to represent the labels of the target SRA value. Software developers chose the SRA risk factors that were pertinent in their situation from the proposed taxonomy for each level of the SDLC process as revealed by the results. As revealed from the study’s findings, knowledge of the identified risk factors may be valuable for evaluating the security risk throughout the SDLC process.
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!

Vers la bibliographie