CFP last date
01 May 2024
Reseach Article

Security Risk Management in IT Projects based on Workflow Mining

by Nkondock M.B. Nicolas, Etame M. Frankie, Atsa E. Roger
Communications on Applied Electronics
Foundation of Computer Science (FCS), NY, USA
Volume 3 - Number 2
Year of Publication: 2015
Authors: Nkondock M.B. Nicolas, Etame M. Frankie, Atsa E. Roger
10.5120/cae2015651910

Nkondock M.B. Nicolas, Etame M. Frankie, Atsa E. Roger . Security Risk Management in IT Projects based on Workflow Mining. Communications on Applied Electronics. 3, 2 ( October 2015), 45-49. DOI=10.5120/cae2015651910

@article{ 10.5120/cae2015651910,
author = { Nkondock M.B. Nicolas, Etame M. Frankie, Atsa E. Roger },
title = { Security Risk Management in IT Projects based on Workflow Mining },
journal = { Communications on Applied Electronics },
issue_date = { October 2015 },
volume = { 3 },
number = { 2 },
month = { October },
year = { 2015 },
issn = { 2394-4714 },
pages = { 45-49 },
numpages = {9},
url = { https://www.caeaccess.org/archives/volume3/number2/442-2015651910/ },
doi = { 10.5120/cae2015651910 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2023-09-04T19:43:21.492061+05:30
%A Nkondock M.B. Nicolas
%A Etame M. Frankie
%A Atsa E. Roger
%T Security Risk Management in IT Projects based on Workflow Mining
%J Communications on Applied Electronics
%@ 2394-4714
%V 3
%N 2
%P 45-49
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Over time, IT projects face several risk that can lead to failures, like security ones. Thus, security risk management and risk management in general in a project is a major issue that the success of the project depends. The sources of security risk are varied in an IT project. Risks should be a comprehensive study by the IT project managers in order to prevent or stop their harmful effects. In this paper, a new approach based on the workflow mining and to manage security risks in an IT project is defined. It is based on the analysis of event logs associated to resources used in a project to identify and analyze security risks therein and therefore able to offer a solution to address them. As a result, patterns of identification and treatment of risks are proposed on the basis of a policy of risk management.

References
  1. Standish Group. The Standish Group Report - CHAOS. Project Smart, 2014.
  2. Barry W. Boehm. Software risk management: Principles and practices. IEEE Software, 8(1):32–41, 1991.
  3. Shareeful Islam. Software Development Risk Management Model- a goal-driven approach. PhD thesis, TechnischeUniversitatMunchen, March 2011.
  4. Roger AtsaEtoundi. "atsero method : a guideline for business process and workflow modelingwithin an entreprise". International Journal of Scientific Engineering Research, 2, December 2011.
  5. ISO 31000 – Risk Management Standard, page 2, February 2008.
  6. H. Knight. (1921) Risk, Uncertainty and Profit. [Online]. www.econlib.org/library/Knight/knRUP.html
  7. Amine NEHARI TALET, Razali MAT-ZINand Maaradj HOUARI. Risk Management and Information Technology Projects.International Journal of Digital Information and Wireless Communications, (IJDIWC) 4(1): 1-9,2014.
  8. Southern, S, "Creating risk management strategies for IT security," Network Security, pp. 13-14, 2009.
  9. J. Kontio, "The Riskit Method for Software Risk Management version 1, 00," University of Maryland. College Park, MD, Computer Science Technical Reports CS-TR-3782 / UMIACSTR- 97-38, 1997.
  10. Boehm, B., & Bose, P., "A collaborative spiral software process model based on theory W", in 3rd International Conference on the Software Process (ICSP94), New York, 1994.
  11. Higuera.R&Haimes.Y, "Software Risk Management", Software Engineering Institute Carnegie Mellon University, Pittsburgh, Pennsylvania 15213, Technical Report CMU/SEI-96-TR-012 ESC-TR-96-012, 1996.
  12. Etoundi Roger, Atsa, Onanena Georges, Nkoulou, Mi Bahanag Nicolas, Nkondock,&MoyoAchille, M. (2013). A Formal Framework for Intrusion Detection within an Information System based on Workflow Audit. International Journal of Computer Applications, 81(1), 1-10.
  13. S., Feather, M., & Hicks, K. Cornford, "DDPTool for life-Cycle Risk Management. Jet Propulsion Laboratory," CalifornaiaInstitutte of Technology, IEEE, 2001.
  14. J., Jurison, "Software project management: The manager’s view," Communications of Association for Information Systems, vol. 2, no. 17, pp. 2-52, 1999.
  15. Bandyopadhyay, K., Myktyn, P., &Myktyn, K., "A framework for integrated risk management in information technology",Management Decision, pp. 437-444, 1999.
  16. Bruckner, M., List, B., &Schiefer, J., "Risk-Management for Data Warehouse Systems," Data Warehousing and Knowledge, pp. 219-229, 2001.
  17. Beck, T., Levine, R., Loayza N., "Finance and the Sources of Growth",Journal of Finance and Economics, vol. 58, pp. 261-300, 2000.
  18. P. & Merritt, G. Smith, "Proactive Risk Management: Controlling Uncertainty in Product Development",Productivity Press, New York, 2002.
  19. Project Management Institute, A Guide to the Project Management Body of Knowledge (PMBOK® Guide), 4th ed., 2008. [Online].http://www.projectsmart.co.uk/pdf/pmbok.pdf
  20. Sommerville. I, Software Engineering, 8th ed. University of St. Andrews, United Kingdom: Addison-Wesley,2006.
  21. Software & Systems Engineering Standards Committee of the IEEE Computer Society, "Systems and software engineering — Life cycle processes — Risk management," International Organization forStandardization/International Electrotechnical Commission, ISO/IEC 16085 IEEE Std 16085-2006.
  22. TOGAF. (2009) The Open Group Architecture Framework (TOGAF). [Online]. http://www.kingdee.com/news/subject/10togaf/pdf/TOGAF_9_ziyuan.pdf
  23. J. Herbst L. Maruster1 G.Schimm W.M.P. van der Aalst, B.F. van Dongen and A.J.M.M.Weijters. "workow mining: A survey of issues and approaches.
  24. C.J. Fidge A.H.M. terHofstede A. Pika, W.M.P. van der Aalst and M.T. Wynn. Profilingevent logs to configure risk indicators for process delays. International Conference onAdvanced Information Systems Engineering (Caise 2013), Springer-Verlag, volume 7908 ofLecture Notes in Computer Science: 465–481, 2013.
  25. K. Vergidis A. Tiwari A.K. Jallow, B. Majeed and R. Roy. Operational risk analysis in business processes. BT Technology Journal, 25(1):168–177, 2007.
  26. R.C. Lunardi L.Z. Granville L.P. Gaspary J.A. Wickboldt, L.A. Bianchin and C. Bartolini.A framework for risk assessment based on analysis of historical information of workflowexecution in it systems. Computer Networks, 55(13):2954–2975, 2011.
  27. R.D. Tennent. The denotational semantics of programming languages ii. Communicationof the ACM, 1976.
  28. Joseph A. Goguen. Hidden Algebra for software Engineering. University of California at San Diego, La Jolla CA 92093-0114 USA.
  29. Victoria Montgomery. New statistical methods in risk assessment by probability bounds.PhD Thesis, Durham University, UK, February 2009.
Index Terms

Computer Science
Information Sciences

Keywords

Risk risk management IT project workflow mining