Skip to main content

Capturing Dependability Threats in Conceptual Modelling

  • Chapter
Conceptual Modelling in Information Systems Engineering

Abstract

To improve the focus on security and other dependability issues it might be useful to include such concerns into mainstream diagram notations used in information systems analysis. In particular, there have been proposals introducing inverted icons to depict functionality not wanted in the system (e.g., misuse cases) or actors with malicious intent (in i* diagrams), thus addressing security issues in such notations. But there are many other modelling notations also used in early systems development, and the focus on dependability could be strengthened if these provided similar means to incorporate dependability issues. This paper looks at the possibilities for addressing dependability in information models and workflow models. To maintain visual consistency with the abovementioned proposals, it is suggested to apply inverted icons also here. In information models this can be used to represent misinformation, and in workflow models malicious or fraudulent actions attacking the business process. In both cases, inversion of icons contributes to clearly distinguishing between what is wanted in the system and what must be avoided, thus enabling a visual representation of dependability concerns.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 59.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Alexander, I., Misuse Cases: Use Cases with Hostile Intent. IEEE Software, 2003. 20(1): p. 58–66.

    Article  Google Scholar 

  2. Andrews, M. and J.A. Whittaker, How to Break Web Software. 2006, Upper Saddle River, NJ: Addison-Wesley.

    Google Scholar 

  3. Bauer, M.D. Fear and loathing in information security. 2005 11 Feb [cited 2006 1 Oct]; Available from: http://www.oreillynet.com/pub/a/network/2005/02/11/mbauer_1.html

    Google Scholar 

  4. Brasethvik, T. and J.A. Gulla. A Conceptual Modeling Approach to Semantic Document Retrieval. in 14th International Conference on Advanced Information Systems Engineering (CAiSE’02). 2002. Toronto: Springer Verlag.

    Google Scholar 

  5. Brasethvik, T. and A. Sølvberg. A Referent Model of Documents. in 1th ERCIM Database Research Group Workshop on Metadata for Web Databases. 1998. Sankt Augustin, Germany: ERCIM.

    Google Scholar 

  6. Burney, M. Don’t Believe Everything You Read-Even in Medical Journals. HealthFactsAndFears.com 2005 [cited 2006 1.1.]; Available from: http://www.acsh.org/factsfears/newsID.591/news_detail.asp

    Google Scholar 

  7. CCIMB, Common Criteria for Information Technology Security Evaluation. 1999, Common Criteria Implementation Board.

    Google Scholar 

  8. CSC. How CSC’s Bill Tafoya Applies Creative Thinking to IT Security. 2002 [cited 2006 1 Oct]; Available from: http://www.csc.com/features/2002/117.shtml

    Google Scholar 

  9. Detwiler, S., Charlatans, Leeches, and Old Wives: Medical Misinformation. Searcher, 2001. 9(3).

    Google Scholar 

  10. Gulla, J.A., O.I. Lindland, and G. Willumsen. PPP: A Integrated CASE Environment. in Advanced Information Systems Engineering, CAiSE’91. 1991. Trondheim, Norway: Springer (Lecture Notes in Computer Science 498).

    Google Scholar 

  11. Ioannidis, J.P.A., Contradicted and initially stronger effects in highly cited clinical journals. Journal of the American Medical Association, 2005. 294: p. 218–228.

    Article  MathSciNet  Google Scholar 

  12. Jürjens, J., Secure Systems Development with UML. 2004, Berlin: Springer.

    Google Scholar 

  13. Leveson, N.G., Safeware: System Safety and Computers. 1995, Boston: Addison-Wesley.

    Google Scholar 

  14. Kung, C.H, Sølvberg, A.: Activity Modeling and Behavior Modeling. in IFIP WG 8.1 Working Conference on Comparative Review of Information Systems Design Methodologies: Improving the Practice (CRIS’ 86). 1986. Noordwijkerhout, The Netherlands: North-Holland.

    Google Scholar 

  15. Liu, L., E. Yu, and J. Mylopoulos. Security and Privacy Requirements Analysis within a Social Setting. in 11th International Requirements Engineering Conference (RE’03). 2003. Monterey Bay, CA: IEEE Press.

    Google Scholar 

  16. Mitnick, K.D. and W.L. Simon, The Art of Intrusion. 2006, Indianapolis: Wiley.

    Google Scholar 

  17. Mitnick, K.D. and W.L. Simon, The Art of Deception: Controlling the Human Element of Security. 2002, Indianapolis: Wiley Publishing, Inc.

    Google Scholar 

  18. Mouratidis, H., P. Giorgini, and G. Manson. Integrating Security and Systems Engineering: Towards the Modelling of Secure Information Systems. in 15th Conference on Advanced Information Systems Engineering (CAiSE’03). 2003. Velden, Austria: Springer LNCS 2681.

    Google Scholar 

  19. Petit, M., Knowledge map of research in interoperability in the INTEROP NoE. 2004, Univ. Namur, Belgium. p. 278.

    Google Scholar 

  20. Petri, C.A., Kommunikation mit Automaten. 1962, University of Bonn.

    Google Scholar 

  21. Sindre, G. and A.L. Opdahl. Eliciting Security Requirements by Misuse Cases. in 37th International Conference on Technology of Object-Oriented Languages and Systems (TOOLS-PACIFIC 2000). 2000: IEEE CS Press.

    Google Scholar 

  22. Sølvberg, A., Data and what they refer to, in Conceptual Modeling, Current Issues and Future Directions (Selected Papers from the Symposium on Conceptual Modeling, Los Angeles, CA, held before ER’97). P.P. Chen, et al., Editors. 1999, Springer Verlag: Berlin. p. 211–226.

    Google Scholar 

  23. Sølvberg, A. and D.C. Kung. On Structural and Behavioral Modeling of Reality. in IFIP WG 2.6 Working Conference on Data Semantics (DS-1). 1985. Hasselt, Belgium: North-Holland.

    Google Scholar 

  24. Tabaka, C. Medical misinformation on the internet and how it can harm your tortoise.2003 [cited 2006 1.1.]; Available from: http://www.chelonia.org/articles/Medical_misinformation.htm

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Sindre, G., Opdahl, A.L. (2007). Capturing Dependability Threats in Conceptual Modelling. In: Krogstie, J., Opdahl, A.L., Brinkkemper, S. (eds) Conceptual Modelling in Information Systems Engineering. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-72677-7_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-72677-7_15

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-72676-0

  • Online ISBN: 978-3-540-72677-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics