erise_2011
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| erise_2011 [2013/04/08 18:53] – katsiaryna.labunets@unitn.it | erise_2011 [2021/01/29 10:58] (current) – external edit 127.0.0.1 | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| ===== eRISE Challenge 2011 ==== | ===== eRISE Challenge 2011 ==== | ||
| - | The eRISE challenge 2011 was conducted for empirical evaluation of security engineering methods. The event was carried out in May 2011. Both parts of experiment: training and application, | + | The eRISE challenge 2011 was conducted for empirical evaluation of security engineering methods. The event was carried out in May 2011. Both parts of experiment, training and application |
| - | + | ||
| - | eRISE event has the objective of providing the method designer with: | + | |
| - | * Empirical evaluation and Benchmarking of security engineering methods; | + | |
| - | * Knowledge of how and why participants intend to adopt a method; | + | |
| - | * Feedback to improve a security method by investigating strengths, weakness and limitations of the method. | + | |
| - | + | ||
| - | eRISE aims to provide the participants with the benefit of: | + | |
| - | * Knowledge about various state-of-the art methods in the research field, on analyzing security risks and requirements of a system; | + | |
| - | * Opportunity to participate and work on an international collaborative project remotely. | + | |
| + | You can look a video of eRISE 2011 presentation on [[http:// | ||
| ==== Participants ==== | ==== Participants ==== | ||
| - | In eRISE 2011 were involved the following participants: | + | In eRISE 2011 were involved the following participants: |
| * **Customers** | * **Customers** | ||
| - | * Yudistira Asnar (University of Trento) | + | |
| - | * Federica Paci (University of Trento) | + | |
| * **Method Designers**: | * **Method Designers**: | ||
| - | * Atle Refsdal - SINTEF (CORAS) | + | |
| - | * Thein Than Tun - Open University (Security Argumentation) | + | |
| - | * Michalis Pavlidis, Shareeful Islam - University of East London (Secure Tropos) | + | |
| - | * Fabio Massacci - University of Trento (Si*) | + | |
| - | * **Participants**: | + | * **Participants**: |
| - | * 13 students were enrolled in the Master in Computer Science at the University of Trento; | + | |
| - | * 36 professionals were attending a Master Course in Management of Information System Enterprise at Dauphine University. This master has an admission requirement of a minimum of five years of working experience in the field of Auditing in Information Systems | + | |
| ==== Evaluated Methods ==== | ==== Evaluated Methods ==== | ||
| The selection of the security requirements methods to be evaluated was driven | The selection of the security requirements methods to be evaluated was driven | ||
| Line 33: | Line 23: | ||
| Four methods have been evaluated and compared during eRISE 2011: | Four methods have been evaluated and compared during eRISE 2011: | ||
| - | * **CORAS** is a model-driven method for risk analysis proposed by SINTEF, Norway. Materials: book chapter, tutorial. | + | * **CORAS** is a model-driven method for risk analysis proposed by SINTEF, Norway. Materials: |
| - | * **SECURITY ARGUMENTATION** is a framework for security requirements elicitation and analysis developed at Open University, Buckinghamshire, | + | * **SECURITY ARGUMENTATION** is a framework for security requirements elicitation and analysis developed at Open University, Buckinghamshire, |
| - | * **SECURE TROPOS** is a methodology designed at University of East London, United Kingdom; the methodology supports capturing, analysis and reasoning of security requirements from the early stages of the development process. Materials: paper, tutorial. | + | * **SECURE TROPOS** is a methodology designed at University of East London, United Kingdom; the methodology supports capturing, analysis and reasoning of security requirements from the early stages of the development process. Materials: |
| - | * **SI* ** is a formal framework developed at the University of Trento, Italy for modeling and analyzing security requirements of an organization. Materials: paper, tutorial. | + | * **SI* ** is a formal framework developed at the University of Trento, Italy for modeling and analyzing security requirements of an organization. Materials: |
| + | ==== Application scenario ==== | ||
| + | In eRISE 2011 fictional application scenario, Healthcare Collaboration Network(HCN), | ||
| - | ==== Application scenarios ==== | + | Regional HealthCare Authority needs to monitor and alert citizens on occurrence of endemic or pandemic diseases within the region of CityVille. Healthcare Authority decides to create |
| - | In eRISE 2011 Healthcare Collaboration | + | |
| - | === Healthcare Collaborative Network === | + | The participants, |
| - | Regional HealthCare Authority needs to monitor | + | The materials about this scenario are available online: {{: |
| + | ==== Experimental Procedure ==== | ||
| + | eRISE 2011 was conducted in three main phases: {{ : | ||
| + | * **Training Phase** on May 13, 2011 (at Dauphine Paris University), | ||
| + | * **Application Phases** on May 14-27, 2011 (with face-to-face session on May 26-27 at Dauphine Paris University) where participants applied the methods to analyse security issues | ||
| + | * **Evaluation Phase**, where participants evaluated the methods through focused group interviews while method designers evaluated the final reports. {{ : | ||
| + | - **Two Post-it session** were conducted for each method, each involving six participants, | ||
| + | - **Two focus group discussions** were conducted for each method, each involving | ||
| + | ==== Data Collection and Analysis ==== | ||
| + | We have collected different kinds of data: | ||
| + | * **Questionnaires** include questions on subjects' | ||
| + | * **Q1** was administered before the Training phase and aimed at collecting participant’s level of awareness on Information Security.({{: | ||
| + | * **Q2** was administered to participants after the Training phase and aimed at collecting participants’ first impression about the method ({{: | ||
| + | * **Q3** was administered at the end of remote group collaboration and aimed at collecting participants’ opinion about the method when applied | ||
| + | * **Q4** was administered at the end of the Application phase, after the sessions of face-to-face group work sessions. This questionnaire aimed at collecting final evaluation by participants about the method ({{: | ||
| + | * **Audio/ | ||
| + | * **Post-it Notes* ** list positive and negative aspects about the methods | ||
| + | * **Focus Group Transcripts* ** report the discussion with method designers a number | ||
| + | * **Group Presentations* ** by participants summarize the results of method' | ||
| + | * **Final Reports* ** describe in detail how participants have identified the security requirements following the method. | ||
| - | The materials | + | * These materials are available |
| - | === HCN: Monitoring Adverse Drug Event === | + | === Data Analysis |
| - | Healthcare Collaboration Network (HCN) needs to monitor Adverse Drug Event at the CityVille. | + | Questionnaires have been analyzed using // |
| - | + | ||
| - | The materials about this scenario | + | |
| - | + | ||
| - | + | ||
| - | ==== Context ==== | + | |
| - | + | ||
| - | ==== Experimental Procedure ==== | + | |
| - | + | ||
| - | ==== Data Collection and Analysis ==== | + | |
erise_2011.1365440039.txt.gz · Last modified: (external edit)
