Статті в журналах з теми "Software risk mitigation"

Щоб переглянути інші типи публікацій з цієї теми, перейдіть за посиланням: Software risk mitigation.

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Software risk mitigation".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.

1

Mittal, Sonam. "Risk Analysis and Mitigation Steps in Different Phases of Software Development." International Journal of Scientific Research 2, no. 6 (June 1, 2012): 241–43. http://dx.doi.org/10.15373/22778179/june2013/77.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Rahman, Tania, Shanto Kumar Saha, Md Sajjadur Rahman Sohel, Md Tamim Maula, Abhijit Bowmik, and Rashidul Hasan Nabil. "Risk Identification and Analysis in Software Development in Bangladesh IT Industry: A Hybrid Model." AIUB Journal of Science and Engineering (AJSE) 21, no. 1 (May 12, 2022): 37–44. http://dx.doi.org/10.53799/ajse.v21i1.308.

Повний текст джерела
Анотація:
Software risk management is a critical and multi-stage process. All over the world, IT Industries face some threats during software risk management processes. Bangladesh is not exceptional. Our principal goal is to manage risk for Bangladesh's IT Industry. To gain a clear and transparent idea survey is the most effective way. And so, we arranged a survey questionnaire and collected data for risk impact areas on Bangladesh IT Industry. A workable and feasible risk management approach prompts an idea for the risk-mitigating plan. In any case, the high proportion of IT project failures demonstrates the futility of risk mitigation activities. From the survey, it is discovered that the most irritating obstructions behind software disappointment for the presence of covered-up and inconspicuous risks and lack of user communication, and lack of proper training on new technology which is overlooked in the greater part of the models. The proposed model works with the improvement of the risk mitigation plan through four phases, the DVC committee, and the NUT train-up team. Depending upon the survey replies added another unique feature called the NUT train-up team. The model considered all four phases of risk management, with the mitigation phase and training on new technologies receiving the greatest attention.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Verner, J. M., O. P. Brereton, B. A. Kitchenham, M. Turner, and M. Niazi. "Risks and risk mitigation in global software development: A tertiary study." Information and Software Technology 56, no. 1 (January 2014): 54–78. http://dx.doi.org/10.1016/j.infsof.2013.06.005.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

., S. Rehman. "SOFTWARE SECURITY RISK MITIGATION USING OBJECT ORIENTED DESIGN PATTERNS." International Journal of Research in Engineering and Technology 02, no. 07 (July 25, 2013): 71–89. http://dx.doi.org/10.15623/ijret.2013.0207010.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Frydman, Maxime, Guifré Ruiz, Elisa Heymann, Eduardo César, and Barton P. Miller. "Automating Risk Analysis of Software Design Models." Scientific World Journal 2014 (2014): 1–12. http://dx.doi.org/10.1155/2014/805856.

Повний текст джерела
Анотація:
The growth of the internet and networked systems has exposed software to an increased amount of security threats. One of the responses from software developers to these threats is the introduction of security activities in the software development lifecycle. This paper describes an approach to reduce the need for costly human expertise to perform risk analysis in software, which is common in secure development methodologies, by automating threat modeling. Reducing the dependency on security experts aims at reducing the cost of secure development by allowing non-security-aware developers to apply secure development with little to no additional cost, making secure development more accessible. To automate threat modeling two data structures are introduced, identification trees and mitigation trees, to identify threats in software designs and advise mitigation techniques, while taking into account specification requirements and cost concerns. These are the components of our model for automated threat modeling, AutSEC. We validated AutSEC by implementing it in a tool based on data flow diagrams, from the Microsoft security development methodology, and applying it to VOMS, a grid middleware component, to evaluate our model's performance.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Taylor, David, Derek Williamson, Harprit Kaur, Kevin Macintosh, Leo Brewster, and Ramon Roach. "BARBADOS NATIONAL COASTAL RISK INFORMATION AND PLANNING PLATFORM A SOFTWARE SYSTEM FOR HAZARDS, VULNERABILITY & RISK." Coastal Engineering Proceedings, no. 36 (December 30, 2018): 55. http://dx.doi.org/10.9753/icce.v36.risk.55.

Повний текст джерела
Анотація:
The Barbados National Coastal Risk Information and Planning Platform (NCRIPP) is a study nearing completion to quantify coastal risk and develop a software system to serve this information country-wide. The NCRIPP follows extensive coastal baseline studies and includes assessment of eight hazards, vulnerability assessment and finally a risk assessment. The software platform is a cloud-based system that includes a large catalogue of assets, hazard overlays, and the ability to calculate damages , and mitigation alternatives.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Marx, Ben, and Deon Oosthuizen. "Risk assessment and mitigation at the information technology companies." Risk Governance and Control: Financial Markets and Institutions 6, no. 2 (2016): 44–51. http://dx.doi.org/10.22495/rcgv6i2art6.

Повний текст джерела
Анотація:
Developing computer software that is free from material defects is the ultimate goal for software developers; however, due to the cost and complexity of software development, it is a goal that is unlikely to be achieved. As a consequence of the inevitable defects that manifest within computer software, the task of software patch management becomes a key focus area for software companies, IT departments, and even end users. Audit departments, as part of their responsibilities, are required to provide assurance on the patching process and therefore need to understand the various decision-making factors. Software flaws that exist within computer systems may put confidential information at risk and may also compromise the availability of such systems. The study investigated the recommended approaches for the task of software patching, with a view to balancing the sometimes conflicting requirements of security and system availability. The study found that there are a number of key aspects that are required to ensure a successful patching process and that the internal auditors of the ‘big four’ South African banks considered most of these factors to be important.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Yan, Shujie, Liangzhu (Leon) Wang, Michael J. Birnkrant, Zhiqiang (John) Zhai, and Shelly L. Miller. "Multizone Modeling of Airborne SARS-CoV-2 Quanta Transmission and Infection Mitigation Strategies in Office, Hotel, Retail, and School Buildings." Buildings 13, no. 1 (December 31, 2022): 102. http://dx.doi.org/10.3390/buildings13010102.

Повний текст джерела
Анотація:
Airborne transmission of SARS-CoV-2 mostly occurs indoors, and effective mitigation strategies for specific building types are needed. Most guidance provided during the pandemic focused on general strategies that may not be applicable for all buildings. A systematic evaluation of infection risk mitigation strategies for different public and commercial buildings would facilitate their reopening process as well as post-pandemic operation. This study evaluates engineering mitigation strategies for five selected US Department of Energy prototype commercial buildings (i.e., Medium Office, Large Office, Small Hotel, Stand-Alone Retail, and Secondary School). The evaluation applied the multizone airflow and contaminant simulation software, CONTAM, with a newly developed CONTAM-quanta approach for infection risk assessment. The zone-to-zone quanta transmission and quanta fate were analyzed. The effectiveness of mechanical ventilation, and in-duct and in-room air treatment mitigation strategies were evaluated and compared. The efficacy of mitigation strategies was evaluated for full, 75%, 50% and 25% of design occupancy of these buildings under no-mask and mask-wearing conditions. Results suggested that for small spaces, in-duct air treatment would be insufficient for mitigating infection risks and additional in-room treatment devices would be needed. To avoid assessing mitigation strategies by simulating every building configuration, correlations of individual infection risk as a function of building mitigation parameters were developed upon extensive parametric studies.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Biro, Miklos, Atif Mashkoor, Johannes Sametinger, and Remzi Seker. "Software Safety and Security Risk Mitigation in Cyber-physical Systems." IEEE Software 35, no. 1 (January 2018): 24–29. http://dx.doi.org/10.1109/ms.2017.4541050.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Hasni, Mohamed S. M., and Turhan Köprübaşı. "Controlling Task Dependency as a Risk Mitigation Process." International Journal of Emerging Research in Management and Technology 6, no. 11 (June 13, 2018): 19. http://dx.doi.org/10.23956/ijermt.v6i11.42.

Повний текст джерела
Анотація:
The construction of highly reliable software projects requires that these projects meet the objectives for which they have been set, and therefore failure to meet any of these objectives and needs will make the software project prone to failure. Thus, ignoring strong needs and not including users adequately especially in identifying their needs and tracking their dependencies clearly can be considered one of the main risks of failure. In this paper, we present a systematic approach to addressing this phenomenon and its mitigation mechanism.
Стилі APA, Harvard, Vancouver, ISO та ін.
11

Cardan, Rex A., Elizabeth L. Covington, and Richard A. Popple. "Code Wisely: Risk assessment and mitigation for custom clinical software." Journal of Applied Clinical Medical Physics 22, no. 8 (July 10, 2021): 273–79. http://dx.doi.org/10.1002/acm2.13348.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
12

Anthony Jnr, Bokolo, Noraini Che Pa, Rozi Nor Haizan Nor, and Yusmadi Jah Josoh. "KNOWLEDGE MAPPING PROCESS MODEL FOR RISK MITIGATION IN SOFTWARE MANAGEMENT." International Journal of Software Engineering and Computer Systems 3 (February 28, 2017): 1–16. http://dx.doi.org/10.15282/ijsecs.3.2017.1.0023.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
13

Gefen, Wyss, and Lichtenstein. "Business Familiarity as Risk Mitigation in Software Development Outsourcing Contracts." MIS Quarterly 32, no. 3 (2008): 531. http://dx.doi.org/10.2307/25148855.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
14

Varnell-Sarjeant, Julia F. "Managing a man-rated software development program via risk mitigation." ACM SIGSOFT Software Engineering Notes 33, no. 4 (July 2008): 1–8. http://dx.doi.org/10.1145/1384139.1384147.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
15

Malik, Vinita, and Sukhdip Singh. "An Artificially Intelligent Algorithmic Paradigm for Risk Mitigation in Risk Managed Software Testing." Journal of Data Processing 8, no. 3 (September 1, 2018): 100. http://dx.doi.org/10.6025/jdp/2018/8/3/100-105.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
16

Biswas, Baidyanath, and Arunabha Mukhopadhyay. "G-RAM framework for software risk assessment and mitigation strategies in organisations." Journal of Enterprise Information Management 31, no. 2 (March 5, 2018): 276–99. http://dx.doi.org/10.1108/jeim-05-2017-0069.

Повний текст джерела
Анотація:
Purpose Malicious attackers frequently breach information systems by exploiting disclosed software vulnerabilities. Knowledge of these vulnerabilities over time is essential to decide the use of software products by organisations. The purpose of this paper is to propose a novel G-RAM framework for business organisations to assess and mitigate risks arising out of software vulnerabilities. Design/methodology/approach The G-RAM risk assessment module uses GARCH to model vulnerability growth. Using 16-year data across 1999-2016 from the National Vulnerability Database, the authors estimate the model parameters and validate the prediction accuracy. Next, the G-RAM risk mitigation module designs optimal software portfolio using Markowitz’s mean-variance optimisation for a given IT budget and preference. Findings Based on an empirical analysis, this study establishes that vulnerability follows a non-linear, time-dependent, heteroskedastic growth pattern. Further, efficient software combinations are proposed that optimise correlated risk. The study also reports the empirical evidence of a shift in efficient frontier of software configurations with time. Research limitations/implications Existing assumption of independent and identically distributed residuals after vulnerability function fitting is incorrect. This study applies GARCH technique to measure volatility clustering and mean reversal. The risk (or volatility) represented by the instantaneous variance is dependent on the immediately previous one, as well as on the unconditional variance of the entire vulnerability growth process. Practical implications The volatility-based estimation of vulnerability growth is a risk assessment mechanism. Next, the portfolio analysis acts as a risk mitigation activity. Results from this study can decide patch management cycle needed for each software – individual or group patching. G-RAM also ranks them into a 2×2 risk-return matrix to ensure that the correlated risk is diversified. Finally the paper helps the business firms to decide what to purchase and what to avoid. Originality/value Contrary to the existing techniques which either analyse with statistical distributions or linear econometric methods, this study establishes that vulnerability growth follows a non-linear, time-dependent, heteroskedastic pattern. The paper also links software risk assessment to IT governance and strategic business objectives. To the authors’ knowledge, this is the first study in IT security to examine and forecast volatility, and further design risk-optimal software portfolios.
Стилі APA, Harvard, Vancouver, ISO та ін.
17

Alfarisi, Salman, and Nico Surantha. "Risk assessment in fleet management system using OCTAVE allegro." Bulletin of Electrical Engineering and Informatics 11, no. 1 (February 1, 2022): 530–40. http://dx.doi.org/10.11591/eei.v11i1.3241.

Повний текст джерела
Анотація:
The purpose of this study is to use the OCTAVE allegro methodology to identify risks in fleet management system (FMS), determine prioritized risks to be mitigated, provide mitigation recommendations for these prioritized risks, and shows how effective the recommendation is. The result of this study is expected to become an input for FMS service provider of possible risks in FMS services, and risk mitigation approaches that can be used to handle those risks. This risk assessment has successfully identified 6 critical information assets, 10 risks in total, and 4 risks that need to be mitigated, followed by proposed mitigation approaches for those risks. Some of the recommendation has been applied by the company and contribute to SLA achievement of the system. The result also showed that application and simulation software provide most prominent risks in FMS service, thus securing these two will eliminate most risk in FMS service.
Стилі APA, Harvard, Vancouver, ISO та ін.
18

Firdose, Salma, and L. Manjunath Rao. "3LRM-3 Layer Risk Mitigation Modelling of ICT Software Development Projects." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 1 (February 1, 2016): 349. http://dx.doi.org/10.11591/ijece.v6i1.9026.

Повний текст джерела
Анотація:
With the adoption of new technology and quality standards, the software development firms are still encountering the critical issues of risk modelling. With the changing dynamics of customer needs, potential competition has being mushrooming in the global IT markets to relay a new standard of software engineering which has higher capability of sustaining risk. However, till date, it is still theoretical to large extent from research viewpoint. Hence, this paper presents a mathematical model called as 3LRM that is designed with the simple approach keeping in mind the real-time issues of risk factors in software engineering for ICT software development project. The study has also identified requirement volatility as one of the prominent source of risk and hence, the framework intends to identify a risk as well as mitigating the risk to a large extent. The paper is illustrated with some of the simple statistical approaches of random probability.
Стилі APA, Harvard, Vancouver, ISO та ін.
19

Firdose, Salma, and L. Manjunath Rao. "3LRM-3 Layer Risk Mitigation Modelling of ICT Software Development Projects." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 1 (February 1, 2016): 349. http://dx.doi.org/10.11591/ijece.v6i1.pp349-356.

Повний текст джерела
Анотація:
With the adoption of new technology and quality standards, the software development firms are still encountering the critical issues of risk modelling. With the changing dynamics of customer needs, potential competition has being mushrooming in the global IT markets to relay a new standard of software engineering which has higher capability of sustaining risk. However, till date, it is still theoretical to large extent from research viewpoint. Hence, this paper presents a mathematical model called as 3LRM that is designed with the simple approach keeping in mind the real-time issues of risk factors in software engineering for ICT software development project. The study has also identified requirement volatility as one of the prominent source of risk and hence, the framework intends to identify a risk as well as mitigating the risk to a large extent. The paper is illustrated with some of the simple statistical approaches of random probability.
Стилі APA, Harvard, Vancouver, ISO та ін.
20

Patil, Shruti, and Roshani Ade. "A Global Software Engineering Knowledge Management Approach for Intensive Risk Mitigation." International Journal of Managing Public Sector Information and Communication Technologies 6, no. 1 (March 31, 2015): 01–08. http://dx.doi.org/10.5121/ijmpict.2015.6101.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
21

Abdul-Rahman, Hamzah, Faizul Azli Mohd-Rahim, and Wang Chen. "Reducing failures in software development projects: effectiveness of risk mitigation strategies." Journal of Risk Research 15, no. 4 (April 2012): 417–33. http://dx.doi.org/10.1080/13669877.2011.634520.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
22

Putra, Yanuar Dharma, and Imron Mawardi. "ELIMINASI RISIKO OPERASIONAL BMT SRI SEJAHTERA SURABAYA." Jurnal Ekonomi Syariah Teori dan Terapan 6, no. 7 (January 17, 2020): 1317. http://dx.doi.org/10.20473/vol6iss20197pp1317-1330.

Повний текст джерела
Анотація:
The results of this research are risk mitigation measures in the continuity of internal processes, human resources, technology and information. Risk mitigation on the internal processes is done by performing supervision based on employees job description, and implementation of sharia financing agreements with customers. Risk mitigation on human resources is done by providing moral guidance to employees. Risk mitigation in information technology is carried out by performing regular maintenance of computer software and hardware, as well as other devices that support Baitul Maal wa tamwil Sri Sejahtera business activities.
Стилі APA, Harvard, Vancouver, ISO та ін.
23

IMADE, Odaro S., and Faith I. AKINNIBOSUN. "The risk mitigation indices associated with some risk mitigation protocols performed on contaminated aqua-cultured catfish (Clarias gariepinus)." Notulae Scientia Biologicae 12, no. 1 (March 31, 2020): 172–83. http://dx.doi.org/10.15835/nsb12110633.

Повний текст джерела
Анотація:
The present research quantified the risk mitigation indices associated with some risk mitigation protocols practiced by humans in Nigeria to mitigate the baseline risk of illness that were associated with Clarias gariepinus contaminated with multidrug-resistant AmpC beta-lactamase-producing Enterobacter cloacae pathogen. Identification of the multidrug-resistant AmpC beta-lactamase-producing E. cloacae pathogen was performed with phenotypic and molecular methods. The United States FDA-iRisk stochastic software quantified the baseline and residual risk of illness associated with the contamination and cross-contamination routes of the C. gariepinus chain. The fresh adult C. gariepinus was contaminated with the multidrug-resistant E. cloacae pathogen (median concentration = 4.49 CFU g-1), but this was significantly reduced by the risk mitigation protocols practiced by the human consumers. The risk mitigation practices of human consumers resulted in a risk mitigation index of 0.92, which was equivalent to a 92% reduction in the baseline risk of illness (baseline risk of illness = 7.58 × 10-4; residual risk of illness = 5.9 × 10-5). In spite of the significant risk mitigation, inducible AmpC beta-lactamase resistance genes was still found in the residual multidrug-resistant Enterobacter cloacae pathogen, which survived the inadequate risk mitigation protocols that accounted for 8% residual risk of illness.
Стилі APA, Harvard, Vancouver, ISO та ін.
24

Hermawan, I., I. Suhendra, H. Wiranata, R. W. Karim, A. W. Astuti, B. Silaen, and D. E. Wicaksono. "Disaster and Risk Mitigation at The Toll Road Planning Stage." IOP Conference Series: Earth and Environmental Science 936, no. 1 (December 1, 2021): 012016. http://dx.doi.org/10.1088/1755-1315/936/1/012016.

Повний текст джерела
Анотація:
Abstract PT. Hutama Karya (Persero), according to Presidential Regulation No. 100 of 2014 and No. 117 of 2015, obtained an assignment to construct and operate 24 sections of Trans Sumatera Toll Road along 2,789 km, including Padang - Pekanbaru Toll Road, where almost all of the segments are located in fault areas and in areas with diverse rock formation. In terms of the number of fault locations, the toll road has a greater risk of earthquakes. Whereas in terms of varying rock formations, construction planning and improper structure determination will cause a highly cost-enhancing effect. In the planning stage, the selection of route is one of the mitigations to minimize the risks and impacts of the earthquake disaster. Toll road trajectories are designed optimally by considering the movement of the earth’s plates based on fault data on these locations and data on rock formations for the construction and structure plan of the Toll Road. Input data needed is Geological Secondary Data and Topographic Data containing information on fault areas and rock formations. Therefore, planning with Quantm Trimble software is the right solution. Determining the route with Quantm Trimble software is one of the effective and efficient methods. The main key in determining routes by Quantm Trimble is the software algorithm which can determine the route quickly by considering the main constraints such as avoiding fault areas, avoiding an area with certain rock formations also determining the construction methods on certain rock formation areas. Quantm Trimble software is able to generate several alternative routes based on user-defined constraints, including accommodating the automatic selected smoothing process according to the specified road geometry standard. The software greatly accommodates the determination of the plan by considering risk and disaster management, as well as being able to manage costs well by determining the construction method plan quickly and accurately.
Стилі APA, Harvard, Vancouver, ISO та ін.
25

Dittmann, Kjeld, and Mogens Blanke. "Risk mitigation by design of autonomous maritime automation systems." at - Automatisierungstechnik 70, no. 5 (May 1, 2022): 469–81. http://dx.doi.org/10.1515/auto-2021-0151.

Повний текст джерела
Анотація:
Abstract Autonomous marine surface vehicles rely on computer systems with computer intelligence making decisions to assist or replace the navigating officer. A fundamental requirement for the design and implementation of such a cyber-physical system is seamless, predictable, and secure interoperability between vendor-specific hardware and software subsystems. The article describes a system design that includes mechanisms to mitigate the risks and consequences of software defects, individual component malfunction, and harmful cyber interference. It addresses international regulations in the field and demonstrates a system design that can meet the requirements for safe behaviour in foreseeable events while also having the ability to call for human assistance if the autonomous system is unable to handle a situation. The paper presents a design for highly automated vessels with several inherent risk-reducing features, including the ability to isolate and encapsulate abnormal behaviours, built-in features to support resilience to unexpected events, and mechanisms for internal defence against cyber-attacks. The article shows how this is provided by a novel middleware that supports risk mitigation, dependability, and resilience.
Стилі APA, Harvard, Vancouver, ISO та ін.
26

Mubin, Sajjad, Shah Jahan, and Ekaterina Gavrishyk. "Monte Carlo Simulation and Modeling of Schedule, Cost and Risks of Dasu Hydropower Project." July 2019 38, no. 3 (July 1, 2019): 557–70. http://dx.doi.org/10.22581/muet1982.1903.03.

Повний текст джерела
Анотація:
HPP (Hydropower Projects) are very complex and risky in nature. For HPP, it is extremely important not only to identify risks but also to adopt proper mitigation measure to complete the project with in defined schedule and budget. Attempt has been made in this paper to identify critical risks associated with Dasu HPP and their mitigation measure to complete the project within predefined time and budget. The research methodology involved the questionnaire survey for identification of potential risks with their probabilities and impact. Pert-Master (Oracle Risk) software was used for simulation purposes. After feeding all data in the software, Monte Carlo simulation was run at 1,000 iterations to generate most probable duration of project, most probable cost of the project, critical risks sensitive to duration, critical risk sensitive to cost and statistically analyzed critical tasks/activities, which need due consideration for successful completion of project. Simulated schedule and budget was compared with planned one to find possible deviations, which may be eliminated by using mitigation measures proposed in the last section of the paper.
Стилі APA, Harvard, Vancouver, ISO та ін.
27

Umar, Rusydi, Imam Riadi, and Ridho Surya Kusuma. "Mitigating Sodinokibi Ransomware Attack on Cloud Network Using Software-Defined Networking (SDN)." International Journal of Safety and Security Engineering 11, no. 3 (June 30, 2021): 239–46. http://dx.doi.org/10.18280/ijsse.110304.

Повний текст джерела
Анотація:
Sodinokibi Ransomware virus becomes a severe threat by targeting data encryption on a server, and this virus infection continues to spread to encrypt data on other computers. This study aims to mitigate by experiment with building a prevention system through computer network management. The mitigation process is carried out through static, dynamic, and Software-Defined Networking (SDN) analysis to prevent the impact of attacks through programmatic network management. SDN consists of two main components in its implementation, the Ryu controller and Open Virtual Switch (OVS). Result testing mitigation system on infected networks by crippling TCP internet protocol access can reduce virus spread by 17.13% and suppress Sodinokibi traffic logs by up to 73.97%. Based on the percentage data, SDN-based mitigation in this study is per the objectives to make it possible to mitigate Ransomware attacks on computer network traffic.
Стилі APA, Harvard, Vancouver, ISO та ін.
28

Chang, Chia-Hsun, Jingjing Xu, Jingxin Dong, and Zaili Yang. "Selection of effective risk mitigation strategies in container shipping operations." Maritime Business Review 4, no. 4 (November 18, 2019): 413–31. http://dx.doi.org/10.1108/mabr-04-2019-0013.

Повний текст джерела
Анотація:
Purpose Container shipping companies face various risks with different consequences that are required to be mitigated. Limited empirical research has been done on identifying and evaluating risk management strategies in shipping operations with different risk consequences. This paper aims to identify the appropriate risk mitigation strategies and evaluate the relative importance of these strategies. Design/methodology/approach Literature review and interviews were used to identify and validate the appropriate risk mitigation strategies in container shipping operations. A questionnaire with a Likert five-point scale was then conducted to rank the identified risk mitigation strategies in terms of their overall effectiveness. Top six important strategies were selected to evaluate their relative importance under three risk consequences (i.e. financial, reputation and safety and security incident related loss) through using another questionnaire with paired-comparison. Fuzzy analytic hierarchy process (AHP) was then conducted to analyse the paired-comparison questionnaire. Findings After conducting a systematic literature review and interviews, 18 mitigation strategies were identified. The results from the first questionnaire show that among the 18 strategies, the top three are “form alliances with other shipping companies”, “use more advanced infrastructures (hardware and software)” and “choose partners very carefully”. After conducting fuzzy AHP, the results show that shipping companies emphasize more on reducing the risk consequence of financial loss; and “form alliance with other shipping companies” is the most important risk mitigation strategy. Originality/value This paper evaluates the risk mitigation strategies against three risk consequences. Managers can benefit from the systematic identification of mitigation strategies, which shipping companies can consider for adoption to reduce the operational risk impact.
Стилі APA, Harvard, Vancouver, ISO та ін.
29

Abbas, Haider Muhi, Basel Halak, and Mark Zwolinski. "BTI mitigation by anti-ageing software patterns." Microelectronics Reliability 79 (December 2017): 79–90. http://dx.doi.org/10.1016/j.microrel.2017.10.009.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
30

Palupi, Ghea Sekar, Paramitha Nerisafitra, and Rahadian Bisma. "How Information Literacy Influences Student’s Online Risk Mitigation." Journal of Information Engineering and Educational Technology 6, no. 2 (December 24, 2022): 42–49. http://dx.doi.org/10.26740/jieet.v6n2.p42-49.

Повний текст джерела
Анотація:
The emergence of the COVID-19 pandemic has changed the learning system in higher education which is becoming distance learning using information technology. In addition to providing good opportunities, online learning poses risks that can threaten students. The risks encountered can be sourced from the information aspect. This study aims to determine the level of the role of information literacy which includes skills to obtain, analyze, and evaluate information, on students' awareness of online risk exposure. In this study, a survey was conducted to 264 undergraduate students at various universities in Indonesia. Data analysis was carried out using the SEM-PLS method with the help of SmartPLS 3.0 software to measure the construct of the hypothetical model. The results show that information literacy has a positive relationship with students' awareness of online risks. The relationship is mediated by the existence of self-control and awareness of information privacy by the individual. Therefore, the relationship means that the higher the level of information literacy, the students will be more aware of the online risks that can occur, especially in online learning.
Стилі APA, Harvard, Vancouver, ISO та ін.
31

Shahzad, Basit, Fazal-e-Amin, Ahsanullah Abro, Muhammad Imran, and Muhammad Shoaib. "Resource Optimization-Based Software Risk Reduction Model for Large-Scale Application Development." Sustainability 13, no. 5 (March 1, 2021): 2602. http://dx.doi.org/10.3390/su13052602.

Повний текст джерела
Анотація:
Software risks are a common phenomenon in the software development lifecycle, and risks emerge into larger problems if they are not dealt with on time. Software risk management is a strategy that focuses on the identification, management, and mitigation of the risk factors in the software development lifecycle. The management itself depends on the nature, size, and skill of the project under consideration. This paper proposes a model that deals with identifying and dealing with the risk factors by introducing different observatory and participatory project factors. It is assumed that most of the risk factors can be dealt with by doing effective business processing that in response deals with the orientation of risks and elimination or reduction of those risk factors that emerge over time. The model proposes different combinations of resource allocation that can help us conclude a software project with an extended amount of acceptability. This paper presents a Risk Reduction Model, which effectively handles the application development risks. The model can synchronize its working with medium to large-scale software projects. The reduction in software failures positively affects the software development environment, and the software failures shall reduce consequently.
Стилі APA, Harvard, Vancouver, ISO та ін.
32

Salin, Hannes, and Martin Lundgren. "Towards Agile Cybersecurity Risk Management for Autonomous Software Engineering Teams." Journal of Cybersecurity and Privacy 2, no. 2 (April 13, 2022): 276–91. http://dx.doi.org/10.3390/jcp2020015.

Повний текст джерела
Анотація:
In this study, a framework was developed, based on a literature review, to help managers incorporate cybersecurity risk management in agile development projects. The literature review used predefined codes that were developed by extending previously defined challenges in the literature—for developing secure software in agile projects—to include aspects of agile cybersecurity risk management. Five steps were identified based on the insights gained from how the reviewed literature has addressed each of the challenges: (1) risk collection; (2) risk refinement; (3) risk mitigation; (4) knowledge transfer; and (5) escalation. To assess the appropriateness of the identified steps, and to determine their inclusion or exclusion in the framework, a survey was submitted to 145 software developers using a four-point Likert scale to measure the attitudes towards each step. The resulting framework presented herein serves as a starting point to help managers and developers structure their agile projects in terms of cybersecurity risk management, supporting less overloaded agile processes, stakeholder insights on relevant risks, and increased security assurance.
Стилі APA, Harvard, Vancouver, ISO та ін.
33

LOBATO, LUANNA LOPES, THIAGO JABUR BITTAR, PAULO ANSELMO DA MOTA SILVEIRA NETO, IVAN DO CARMO MACHADO, EDUARDO SANTANA DE ALMEIDA, and SILVIO ROMERO DE LEMOS MEIRA. "RISK MANAGEMENT IN SOFTWARE PRODUCT LINE ENGINEERING: A MAPPING STUDY." International Journal of Software Engineering and Knowledge Engineering 23, no. 04 (May 2013): 523–58. http://dx.doi.org/10.1142/s0218194013500150.

Повний текст джерела
Анотація:
Software Product Line (SPL) Engineering focuses on systematic software reuse, which has benefits such as reductions in time-to-market and effort, and improvements in the quality of products. However, establishing a SPL is not a simple matter, and can affect all aspects of the organization, since the approach is complex and involves major investment and considerable risk. These risks can have a negative impact on the expected ROI for an organization, if SPL is not sufficiently managed. This paper presents a mapping study of Risk Management (RM) in SPL Engineering. We analyzed a set of thirty studies in the field. The results points out the need for risk management practices in SPL, due to the little research on RM practices in SPL and the importance of identifying insight on RM in SPL. Most studies simply mention the importance of RM, however the steps for managing risk are not clearly specified. Our findings suggest that greater attention should be given, through the use of industrial case studies and experiments, to improve SPL productivity and ensure its success. This research is a first attempt within the SPL community to identify, classify, and manage risks, and establish mitigation strategies.
Стилі APA, Harvard, Vancouver, ISO та ін.
34

Zheng, Zheng, and Kishor S. Trivedi. "Guest editorial: special issue on modeling and mitigation techniques for software aging." Software Quality Journal 28, no. 1 (February 26, 2020): 3–5. http://dx.doi.org/10.1007/s11219-020-09496-0.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
35

Rao, Aakarsh, Nadir A. Carreón, Roman Lysecky, and Jerzy Rozenblit. "FIRE: A Finely Integrated Risk Evaluation Methodology for Life-Critical Embedded Systems." Information 13, no. 10 (October 10, 2022): 487. http://dx.doi.org/10.3390/info13100487.

Повний текст джерела
Анотація:
Life-critical embedded systems, including medical devices, are becoming increasingly interconnected and interoperable, providing great efficiency to the healthcare ecosystem. These systems incorporate complex software that plays a significantly integrative and critical role. However, this complexity substantially increases the potential for cybersecurity threats, which directly impact patients’ safety and privacy. With software continuing to play a fundamental role in life-critical embedded systems, maintaining its trustworthiness by incorporating fail-safe modes via a multimodal design is essential. Comprehensive and proactive evaluation and management of cybersecurity risks are essential from the very design to deployment and long-term management. In this paper, we present FIRE, a finely integrated risk evaluation methodology for life-critical embedded systems. Security risks are carefully evaluated in a bottom-up approach from operations-to-system modes by adopting and expanding well-established vulnerability scoring schemes for life-critical systems, considering the impact to patient health and data sensitivity. FIRE combines a static risk evaluation with runtime dynamic risk evaluation to establish comprehensive risk management throughout the lifecycle of the life-critical embedded system. We demonstrate the details and effectiveness of our methodology in systematically evaluating risks and conditions for risk mitigation with a smart connected insulin pump case study. Under normal conditions and eight different malware threats, the experimental results demonstrate effective threat mitigation by mode switching with a 0% false-positive mode switching rate.
Стилі APA, Harvard, Vancouver, ISO та ін.
36

Kumar, Sameer, Anthony Kwong, and Chandan Misra. "Risk mitigation in offshoring of business operations." Journal of Manufacturing Technology Management 20, no. 4 (May 2009): 442–59. http://dx.doi.org/10.1108/17410380910953711.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
37

Kassem, Yousseuf, Hüseyin Gökçekuş, and Nour Alijl. "Flash flood risk assessment modelling and methods: Kyrenia Region, Northern Cyprus." World Journal of Environmental Research 11, no. 1 (May 16, 2022): 42–52. http://dx.doi.org/10.18844/wjer.v11i1.7190.

Повний текст джерела
Анотація:
Flash flooding risk impacts can be reduced through the implementation of mitigation strategies plan (MSP) for flood management. This study aims to develop a flash-floods risk mitigation plan, which appears to be beneficial for municipalities, provincial administrators, and authorities to reduce the impact of the flash flood in the Kyrenia region, Northern Cyprus. In this work, rainfall data were collected from the nearest stations for 22 years. The return periods of maximum daily rainfall are also determined by using six formulas. Furthermore, flood inundation and hazard maps were defined by utilizing SAGA, QGIS, ArcGIS, 2D HEC RAS, and HEC -HMS software then determining the degree of risk and identifying strategies based on quantitative risk analysis by developing a risk matrix. As a final result, catastrophic risk areas are distributed significantly downstream. In conclusion, the proposed flash flood mitigation plan includes strategies to reduce flood losses of human life and constructed structures across Kyrenia and proposed hazard and inundation risk maps to assess planners and decision-makers for the potential impact of floods to avoid. Keywords: DEM; Flash Flood; Hazard map; HEC-RA Mitigation plan; Risk matrix
Стилі APA, Harvard, Vancouver, ISO та ін.
38

Mathew, Saji K., and Yuanyuan Chen. "Achieving offshore software development success: An empirical analysis of risk mitigation through relational norms." Journal of Strategic Information Systems 22, no. 4 (December 2013): 298–314. http://dx.doi.org/10.1016/j.jsis.2013.03.001.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
39

Munang, Aswan, and Isnaini Nurisusilawati. "Modeling Underlying Pattern Making Construction Safety Risk Mitigation Decisions Using Dynamic Systems." Jurnal Ilmiah Teknik Industri 21, no. 1 (June 30, 2022): 37–48. http://dx.doi.org/10.23917/jiti.v21i1.17429.

Повний текст джерела
Анотація:
The Occupational Health and Safety Management System (SMK3) is one of the factors that must be always monitored during the implementation of construction in achieving the success of project objectives. The implementation of SMK3 and decision-making still comes from project actors with different levels of experience gaps, causing the decisions taken to be less systematic and affecting the productivity of project performance. The purpose of the research is to conduct risk management simulations to increase insight into risk management and mitigation as a support for appropriate decision making in supporting project productivity, quality, and cost.Risk identification process through brainstorming, interviews, and observations with competent resource persons and project actors who have more than 5 years of experience in railway projects. Risk identification generates parameters and measures project risk by processing data using SPSS V23 software and dynamic simulation using Vensim PLE software. Simulation shows that there is a decrease in risk parameters in design and technology by -6.29%, construction management -5,12%, work safety and environment -5,90%, materials and equipment 3,37% and logistics -6,23%. Management of SMK3 by combining methods can increase accuracy in making risk mitigation decisions and can improve and understand the complexity of overall risk management performance from time to time.
Стилі APA, Harvard, Vancouver, ISO та ін.
40

Rahayu, Flourensia Sapty, Toni Indrawan, and Shafinah Kamarudin. "Risk Mitigation Strategies in Implementing Scrum Framework for Internet-Based IT Companies in Indonesia." Indonesian Journal of Information Systems 3, no. 1 (August 27, 2020): 50. http://dx.doi.org/10.24002/ijis.v3i1.3589.

Повний текст джерела
Анотація:
To date many Information Technology Companies in Indonesia implement Scrum Framework which is one of the frameworks that uses Agile principles. The implementation of the Scrum Framework does not guarantee that these companies will be free from risk, since many risks will also appear during the implementation of the framework itself. Therefore, risk management strategies are needed to mitigate these risks. This research is a qualitative research to manage risk due to the implementation of Scrum Framework in software development of IT companies, especially in Indonesia. Interviews have been conducted to the Scrum stakeholders in three IT Companies to gather some initial data to be analyzed further using Qualitative Content Analysis Method and Risk Breakdown Structure. Our finding show that there is 17 Risk Registers and their Mitigation Strategies for the implementation of Scrum Framework in Indonesian IT Companies. Furthermore, it can be used as guidelines for decision making about whether to implement this framework in their core businesses.
Стилі APA, Harvard, Vancouver, ISO та ін.
41

Kavallieratos, Georgios, Christos Grigoriadis, Angeliki Katsika, Georgios Spathoulas, Panayiotis Kotzanikolaou, and Sokratis Katsikas. "Risk assessment and control selection for cyber-physical systems: a case study on supply chain tracking systems." Journal of Surveillance, Security and Safety 3, no. 4 (2022): 128–49. http://dx.doi.org/10.20517/jsss.2022.17.

Повний текст джерела
Анотація:
Aim: The paper proposes a novel risk assessment method ology for complex cyber-physical systems: The proposed method ology may assist risk assessors to: (a) assess the risks deriving from cyber and physical interactions among cyber-physical components; and (b) prioritize the control selection process for mitigating these risks. Methods: To achieve this, we combine and modify appropriately two recent risk assessment method ologies targeted to cyber physical systems and interactions, as underlying building blocks. By applying the existing method ology, we enable the utilization of well-known software vulnerability taxonomies, to extract vulnerability and impact submetrics for all the interactions among the system components. These metrics are then fed to the risk analysis phase in order to assess the overall cyber-physical risks and to prioritize the list of potential mitigation controls. Results: To validate the applicability and efficiency of the proposed method ology, we apply it in a realistic scenario involving supply chain tracking systems. Conclusion: Our results show that the proposed method ology can be effectively applied to capture the risks deriving from cyber and physical interactions among system components in realistic application scenarios, while for large scale networks further testing should be carried out.
Стилі APA, Harvard, Vancouver, ISO та ін.
42

Hardiyanto, Yovi. "CENGKLIK RESERVOIR PERFORMANCE ON DROUGHT MITIGATION." Journal of the Civil Engineering Forum 1, no. 2 (July 16, 2017): 69. http://dx.doi.org/10.22146/jcef.24000.

Повний текст джерела
Анотація:
Water availability problem is encountered by Cengklik Reservoir due to drought disaster in the current year. It causes irrigation water crisis over 850 hectares crop field which of 350 hectares were not cultivated. The risk that must be faced by farmers is decrease in potential productivity, losses about more than 2.5 billion. Therefore, it needs technical solution to reduce this drought disaster risk. To obtain an alternative solution against water availability problem for drought disaster mitigation, this research used optimization of reservoir standard operating simulation. It applies field area of rice or Palawija at the second and/or the third cultivation season as decision variable, maximum productivity value as objective function, irrigation water demand as parameter depending on specified alternative crop pattern and schedule, and several constraints comprising 100% of reservoir reliability, all field is irrigated at the first and second season in which maximum non-irrigated crop field at the third cultivation season are 300 hectares. The tool used to conduct optimization was Microsoft Excel software. The result showed that crop pattern considered as an alternative solution against water availability problem in Cengklik reservoir is paddy-paddy-maize at the early of November II cultivated over 433 hectares and 1524 hectares. Risk reduction reached 9.33% in term of reservoir reliability, 23.61% in term of irrigated area, and 27.29% in term of vulnerability towards water availability crisis.
Стилі APA, Harvard, Vancouver, ISO та ін.
43

Shareef, Mohammad Esam, and Dheyaa Ghanim Abdulrazzaq. "River Flood Modelling For Flooding Risk Mitigation in Iraq." Civil Engineering Journal 7, no. 10 (October 1, 2021): 1702–15. http://dx.doi.org/10.28991/cej-2021-03091754.

Повний текст джерела
Анотація:
River flood events have recently been increased due to many reasons such as climate change and excessive land usage. Thus, one of the greatest challenges is to control the flooding in urban areas. River flooding has become a phenomenon worldwide in general and in Iraq specifically. This is associated with the rapid increase of urbanization as well as mismanagement of land utilization; especially those located near the river banks, in addition to lack of consideration in terms of the design and implementation of drainage networks. In Iraq and especially in Al-Anbar governorate, studies in the field of flood simulation control have been rare. This study aims to suggest a fast and accurate methodology for local authorities, by providing a proposed solution and prediction of flooding area in the case study of the Fallujah barrage. Global Mapper software has been used to produce simulation photos on flooding area. Earth Explorer USGS website has been used to download water body data; and Global Digital Surface website has been used to extract and download the surface elevation data. The result of the simulation photos has predicted valuable information about the flooding area and proposed a general vision on the areas that are under threat of flooding. Four main areas were exposed to flooding, area 1, area 2, area 3, and area 4; A total flooding area of 11.89 km2. The total maximum operational level for the barrage was designed to be 44.79 m above sea level. Also, the recommended maximum operation level for the barrage was 43 m ASL. Doi: 10.28991/cej-2021-03091754 Full Text: PDF
Стилі APA, Harvard, Vancouver, ISO та ін.
44

Olaiya, Kehinde, Kareem Arikewuyo, Ashim Shogunro, and Lateef Yunusa. "Effect of Risk Mitigation on Profitability of Insurance Industries in Nigeria." Izvestiya Journal of the University of Economics - Varna 65, no. 3 (November 8, 2021): 330–43. http://dx.doi.org/10.36997/ijuev2021.65.3.330.

Повний текст джерела
Анотація:
Risk management plays a critical part in every organization‘s profit maximization through risk cost minimization for wise protection, which cannot be overstated. Risk mitigation (rmt), risk monitoring (rmn), risk management environment, procedure, and policies (epp), and risk measurement (rme) in relation to the profitability of the insurance industry in Nigeria were randomly selected from a wellstructured 5-point Likert scale questionnaire ranging rom ‘5 strongly agree‘ to ‘4 agree‘, ‘3 undecided‘ to ‘1 strongly disagree‘. Using the StataSE 14 statistical software, one hundred and twenty (120) questionnaires were recovered from respondents, accounting for 83 percent of the total questionnaires sent using the multiple regression statistical methodology. Risk reduction and risk monitoring have a considerable impact on the profitability of insurance companies in Nigeria, according to the findings. As a result, it concluded that risk mitigation and monitoring are important factors in determining industry profitability, and those insurance regulators should work to ensure that risk identification, assessment, measurement, and control mechanisms are implemented in accordance with best global practices in order to avoid financial crises and improve insurance performance.
Стилі APA, Harvard, Vancouver, ISO та ін.
45

Srivanit, Manat. "Community Risk Assessment: Spatial Patterns and GIS-Based Model for Fire Risk Assessment - A Case Study of Chiang Mai Municipality." Journal of Architectural/Planning Research and Studies (JARS) 8, no. 2 (September 3, 2018): 113–26. http://dx.doi.org/10.56261/jars.v8i2.168615.

Повний текст джерела
Анотація:
The main purpose of this study is to develop a GIS-based approach to fire risk assessment to identifysites for disaster mitigation planning and management. Fire risk assessment has two main factors: the vulnerabilityand capacity for mitigation of the areas, as well as the areas with a fire history. The selection of riskfactors is mainly based on stakeholder analysis, involving four groups: urban planners, fire wardens, local residentsand local government officials. The above data are integrated into raster-based GIS software and thenspatial analysis is performed using an overlay technique to generate the fire risk, ranging from high to low accordingto its sensitivity to fire or fire-inducing capability. The result is a map of the varying levels of fire riskacross the city. The weight to each factor is determined by an Analytical Hierarchy Process (AHP). This modelis illustrated with a case study of fire risk of area in the Chiang Mai Municipality (CMM). It is suggested thatrisk mapping is helpful for fire management to minimize fire hazards.
Стилі APA, Harvard, Vancouver, ISO та ін.
46

Huong Tran, Thi Thanh, Paul Childerhouse, and Eric Deakins. "Supply chain information sharing: challenges and risk mitigation strategies." Journal of Manufacturing Technology Management 27, no. 8 (October 3, 2016): 1102–26. http://dx.doi.org/10.1108/jmtm-03-2016-0033.

Повний текст джерела
Анотація:
Purpose The purpose of this paper is to investigate how managers perceive risks associated with sharing information with trading partners, and how they attempt to mitigate them. Design/methodology/approach In this exploratory New Zealand study, qualitative research was conducted involving semi-structured interviews with boundary spanning managers who are responsible for inter-organizational interfaces. Multiple case studies in different industries are used to highlight managers’ perceptions of risks in data exchange process throughout the supply network, and their underlying reasoning. Findings Managers perceive several types of risks when exchanging information across external supply chain interfaces, and adopt different approaches to handling them. The research also reinforces the vital role played by interpersonal relationships and trust as key enablers of inter-organizational cooperation. Research limitations/implications The findings are based on a small sample of 11 case companies based in a single New Zealand province, thereby potentially restricting generalizability. Future work could usefully extend the sample size in order to investigate the correlations between firm sizes, levels of trust, and degrees of data integration within particular industry sectors. Practical implications The findings will help managers understand and evaluate different types of risks in the data exchange process, and enable them to make better decisions that enhance information sharing and supply chain performance. Originality/value Perceived information sharing risks are peculiar to the individual actors, and as such need to be mitigated through changes to their socially constructed perceptions. This work extends the literature on understanding the various dimensions of inter-organizational information sharing.
Стилі APA, Harvard, Vancouver, ISO та ін.
47

Steimers, André, and Moritz Schneider. "Sources of Risk of AI Systems." International Journal of Environmental Research and Public Health 19, no. 6 (March 18, 2022): 3641. http://dx.doi.org/10.3390/ijerph19063641.

Повний текст джерела
Анотація:
Artificial intelligence can be used to realise new types of protective devices and assistance systems, so their importance for occupational safety and health is continuously increasing. However, established risk mitigation measures in software development are only partially suitable for applications in AI systems, which only create new sources of risk. Risk management for systems that for systems using AI must therefore be adapted to the new problems. This work objects to contribute hereto by identifying relevant sources of risk for AI systems. For this purpose, the differences between AI systems, especially those based on modern machine learning methods, and classical software were analysed, and the current research fields of trustworthy AI were evaluated. On this basis, a taxonomy could be created that provides an overview of various AI-specific sources of risk. These new sources of risk should be taken into account in the overall risk assessment of a system based on AI technologies, examined for their criticality and managed accordingly at an early stage to prevent a later system failure.
Стилі APA, Harvard, Vancouver, ISO та ін.
48

Harahap, Rudy M., Andri Setiawan, Adi Subakti Kurniawan, and Merlin Mulia. "PENGUKURAN RISIKO PROYEK PADA PERUSAHAAN TEKNOLOGI INFORMASI DI INDONESIA." CommIT (Communication and Information Technology) Journal 3, no. 2 (October 31, 2009): 70. http://dx.doi.org/10.21512/commit.v3i2.517.

Повний текст джерела
Анотація:
The success rate of information technology (IT) projects is still low. Based on one survey done in 1990s, only about 10% of software development project could be finished according to its planned budget and schedule. Another study in 1995 found that only 16.2% IT project succeed, and at the same time more than 31% IT projects were cancelled before finished. It has been found a lot of IT projects had been implemented with swelling budget. Although it is still debatable, one of the reasons of IT project implementation failure is because risk management in some IT projects is not implemented by the IT providers. The objectives of this research are to get knowledge and assess risks in implementing IT projects. This research also gives recommendations in mitigating IT project risks. In two projects that were used as sample of this research, it has been found some risks that could be happened in IT projects. That risks were then assessed based on the probability and its impact, and finally produced the recommendation for risk mitigation. All risks are described in the Risk Priority, moreover risk probability and impact is described in the probability-impact matrix from all of 4 levels. This research could improve the awareness of IT providers in Indonesia about the important of implementing IT risk management so that more IT projects in Indonesia could be run successfully.Keywords: Risk assessment, information technology project, impact, frequency
Стилі APA, Harvard, Vancouver, ISO та ін.
49

Luxton, Abigail, and Marin Marinov. "Terrorist Threat Mitigation Strategies for the Railways." Sustainability 12, no. 8 (April 22, 2020): 3408. http://dx.doi.org/10.3390/su12083408.

Повний текст джерела
Анотація:
Terrorism is an ever-present threat that is becoming more prevalent in today’s society. The railway has always been a favourable target for terrorists due to the high volume of people that utilise it, as well as the vital services it provides to the nation. The railway is expanding and this will likely result in it becoming increasingly vulnerable to attack, unless new mitigation solutions are devised. In this paper risk assessment analyses by a software package conducted on different sections of the railway station provided insight into the present vulnerabilities. Mitigation solutions were devised to abolish these weaknesses in the system, to avoid terrorist exploitation. They were then evaluated to establish a workable solution: a modified version of the Thales Smart Corridor. This workable solution should be implemented across the nation to ensure passenger and rail infrastructure protection.
Стилі APA, Harvard, Vancouver, ISO та ін.
50

Brooke, Phil, and Richard Paige. "User-visible cryptography in email and web scenarios." Information & Computer Security 23, no. 1 (March 9, 2015): 58–72. http://dx.doi.org/10.1108/ics-07-2013-0054.

Повний текст джерела
Анотація:
Purpose – This paper aims to classify different types of “user-visible cryptography” and evaluate the value of user-visible cryptographic mechanisms in typical email and web scenarios for non-expert IT users. Design/methodology/approach – The authors review the existing literature, and then identify user stories typical to their users of interest. They analyse the risks, mitigations of risks and the limits of those mitigations in the user stories. Findings – The scenarios identified suggest that background, opportunistic encryption has value, but more explicit, user-visible cryptographic mechanisms do not provide any further mitigation. Other mechanisms beyond technological mitigations provide the required mitigation for the users. Research limitations/implications – Further work should be carried out on the trust issues with trusted third parties, as they are intrinsic to global, automated cryptographic mechanisms. The authors suggest that deployed systems should rely on automation rather than explicit user involvement; further work on how best to involve users effectively remains valuable. Practical implications – Deployed systems should rely on automation rather than explicit user dialogues. This follows from recognised aspects of user behaviour, such as ignoring dialogues and unconsciously making a holistic assessment of risk that is mostly mitigated by social factors. Social implications – The user populations concerned rely significantly on the existing legal and social infrastructure to mitigate some risks, such as those associated with e-commerce. Guarantees from third parties and the existence of fallback procedures improve user confidence. Originality/value – This work uses user stories as a basis for a holistic review of the issues surrounding the use of cryptography. The authors concentrate on a relatively large population (non-expert IT users) carrying out typical tasks (web and email).
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії