<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Risk Driven Requirements Speci cation (RiDeRS) of IT-based Homecare Systems ?</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Mohammad Zari Eslami</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Brahmananda Sapkota</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Andrea Herrmann</string-name>
          <email>andreaherrmann3@gmx.de</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Alireza Zarghami</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Marten van Sinderen</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Roel Wieringa</string-name>
          <email>r.j.wieringag@utwente.nl</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Electrical Engineering Mathematics and Computer Science University of Twente</institution>
          ,
          <country country="NL">The Netherlands</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Independent Researcher</institution>
          ,
          <country country="DE">Germany</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Use of IT in providing homecare services to elderly people is expected to reduce the workload of care-providers. It is also expected that this will increase the quality of services by providing services roundthe-clock and will support independent living of the elderly. However, ITbased care systems can also introduce new types of risks such as those related to availability and accountability. This can possibly lead to a decline of using such expensive IT-based homecare systems in practice. In order to prevent this, we propose a method to identify potential risks of using such a system, and to specify additional requirements of the system to mitigate or prevent these risks. We validate the usability and potential utility of our approach by three experiments using a case from the homecare domain. We discuss whether the proposed approach can be generalized for use in the wider class of adaptive critical systems.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        There is an emerging trend in industrialised countries to use IT-based care
services including health monitoring, event-based reminder services and alert
service to support independent living of elderly (care-receivers) in their home [
        <xref ref-type="bibr" rid="ref1 ref18">1,
18</xref>
        ]. The aims are (1) to increase productivity of care-givers, which is needed in
the face of the aging population in the coming years, and (2) to improve the
quality of care. The European Council recognises improvement of patient safety
as one of the bene ts of using eHealth systems [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ]. However, IT-based care
services can also introduce new types of risks.
      </p>
      <p>
        In the literature, risk is de ned di erently in di erent domains [
        <xref ref-type="bibr" rid="ref14 ref30 ref7">30, 14, 7</xref>
        ]. In
this paper, we use the simple dictionary de nition of risk as the \possibility of loss
or injury". We do not assume that probability, loss or injury are quanti able,
since whether they are quanti able strongly dependant on the environment.
However, we do assume that the system under consideration has users who can
? This work is part of the IOP GenCom U-Care project(http://ucare.ewi.utwente.nl),
sponsored by the Dutch Ministry of Economic A airs under contract IGC0816.
be hurt, and so there are risks of loss or injury. Users are biological or legal
persons who can gain or lose something by the actions of the system, and include
patients, their family, nurses, and other health care actors. This means that the
concept of risk is user-dependent: what hurts one user may not hurt another one.
And what one user would consider an injury may be considered as acceptable
pain by another. This means that risk assessments are context-sensitive, and are
not transferable from context to context, but must be repeated for every context.
      </p>
      <p>
        Earlier work, discussed in Section 4, mainly focuses on privacy and security
risks of using an IT-system. We argue that an IT-system is not only subject to
privacy and security risks, but also availability, safety, and accountability risks [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
Materialization of these risks could degrade the quality of life of individual users
and can even prevent the adoption of such a system in real-life. Assessment of
these risks must be performed up-front, as part of requirements engineering,
and must continue during the lifetime of the system to discover and mitigate
unknown or unperceived risks during early requirements engineering [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ]. We
propose a Risk Driven Requirements Speci cation (RiDeRS) approach to elicit
requirements of a system by identifying the risks of using such a system as a
rst step in the requirements engineering process.
      </p>
      <p>Risk-based requirements engineering complements requirements engineering
aimed at positive goals. RiDeRS can be used in early requirements engineering,
but we see no reason why it could not be used at any point in the system's life
cycle to assess risks and to elicit additional requirements.</p>
      <p>In RiDeRS, described in Section 2, we consider users' properties besides their
goals to identify a list of possible risks and to specify the requirements which
could prevent or mitigate these risks. This also helps other stakeholders (e.g.,
care centers) to perform risk-bene t analysis and to decide whether or not to
use the system. What is new in RiDeRS is that it is a goal-oriented method that
aims to balance the assumptions about the environment with the requirements
on the system. It focusses on safety and it is simple to use in practice, as we will
show in our case studies. We apply RiDeRS in a real-life case from the homecare
to illustrate its usability and utility, described in Section 3.
2</p>
    </sec>
    <sec id="sec-2">
      <title>RiDeRS</title>
      <p>
        Critical systems such as IT-based homecare systems have stringent availability
and safety requirements and a failure can threaten human life [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ]. To prevent
such undesirable system behaviours, we introduce RiDeRS as a risk based
approach as a basis for identifying additional requirements on the system to ensure
the safety of end-users while o ering ease of use. In the remaining of this section,
we describe RiDeRS concepts and process.
2.1
      </p>
      <sec id="sec-2-1">
        <title>RiDeRS Concepts</title>
        <p>As shown in Fig. 1, we assume that there is a system which works in an
environment (including the end-users of the system). The system provides services
which are consumed by end-users. The designer of the system makes
assumptions about the environment of the system, and speci cally about the end-users.
These assumptions guided the design and thus underlie the services. Services
have associated goals, as foreseen by the designer, which can be achieved if the
assumptions made by the designer are correct. End-users also have goals, which
they try to achieve by consuming the services provided by the system. However,
if the assumptions made by the designer are incorrect, an end-user may not be
able to achieve his goals. Therefore, assumptions imply a risk, namely that they
do not match the actual properties of end-users, thus preventing end-users from
achieving their goals. Such risks may be identi ed at any point in the lifetime
of the system, and suitable countermeasures may be proposed to mitigate the
risks. Countermeasures are subsequently implemented in the system or in the
environment (possibly in both), resulting in a modi ed system with a changed
speci cation or a modi ed environment with changed properties.</p>
        <p>0..*
Environment</p>
        <p>&amp; its
properties
1..*</p>
        <p>Goal</p>
        <p>1..*
Has
1
End-user
1
1..*
Property</p>
        <p>Has</p>
        <p>1
Service</p>
        <p>Has</p>
        <p>Consumes
0..*</p>
        <p>0..*</p>
        <p>Describes
1..*</p>
        <p>1
1..*</p>
        <p>Assumption
1..* -Risk</p>
        <p>Provides
1..* 1
Underlies</p>
        <p>System</p>
        <p>0..*
System
&amp; its
specifications
Implements</p>
        <p>Countermeasure</p>
        <p>Implements
0..*</p>
        <p>0..*</p>
        <p>We classify the assumptions in six categories:
{ Capability assumptions relate to the capabilities (and limitations) of the
end-user. We are only interested in capabilities that are needed to access a
service through the provided interface. For example, in the case of a medicine
dispenser service, the designer may assume that the end-user can operate a
touch panel to control the dispenser. This assumption is not true if the user
has Parkinson's disease. The risk is then that the user may not be able to
touch the panel in the right positions. Consequently, the system will behave
di erently than desired.
{ Procedure assumptions relate to the procedures followed by the
enduser to access and consume a service. For instance, in the case of a blood
pressure measurement service, the designer may assume that the end-user
follows the proper procedure for blood pressure measurement, namely that
the measurement instrument is placed around the end-user's left arm and he
is in a sitting position. This assumption is not true if the user is an elderly
who forgets the correct procedure and attaches the blood pressure cu to his
wrist. The risk is then that the measured values are not precise or reliable.
{ Location assumptions relate to the location of the user carrying a device
with sensors that measures a location parameter for a context-aware service.
For example, the designer assumes that the location of the user can be
determined with a GPS receiver in the user's phone. This assumption is not true
if the user does not carry his phone. The risk is then that a location-based
service is applied to the wrong location, and the user is not able to consume
the service or consumes a service that is not optimal for his needs/goal.
{ Identity assumptions relate to the identity of the user who uses a device
with sensors that measures the necessary user context parameters. In the
blood pressure example, the designer assumes that the measured values from
a speci c blood pressure meter are in fact those for the intended care-receiver.
This assumption is not true if the user takes an instrument which does not
belong to him. The risk is then that the reported blood pressure values are
not correct and could result in incorrect health related decisions.
{ Needs assumptions relate to the user having needs matching the user
context in which the context-aware service is being o ered. For example, the
designer assumes that the user needs an audio reminder to take a medicine
every ve minutes until the medicine is taken. This assumption is not true
if the user has not forgotten to take the medicine, but he has an urgent
task to nish before he can go to the medicine dispenser. The risk is then
that the user will turn o the reminder service because it irritates him, and
subsequently forgets to take his medicine.
{ Timing assumptions relate to the availability of the user (at a speci c
place/time). For any user-triggered service, the user should be available to
initiate the service and to consume the o ered service. For example, the
designer assumes that the user can react to a reminder in say 5 minutes to
measure his blood pressure and after 3 reminder repetitions the system raises
an alert assuming that the user ignored the reminders. This assumption is not
true if the user received the rst reminder correctly and acted accordingly,
however, because he is far from the place of the measurement, it takes him
longer than expected to act. In this case, the system raises an unnecessary
alert that irritates the care-givers.
2.2</p>
      </sec>
      <sec id="sec-2-2">
        <title>RiDeRS Process</title>
        <p>
          We de ne RiDeRS based on the existing quality requirements approach
MOQARE [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ]. In MOQARE, quality requirements of a system are speci ed based
on identi cation of misuse cases. In RiDeRS, we also specify quality requirements
by identifying risks; however, we specialize as well as extend MOQARE. We
consider misuse cases which are caused due to wrong assumptions by the designer
about the users (and the use) of the system. Fig. 2 illustrates the RiDeRS
process steps in BPMN notation. The process starts by identifying the users of the
system and, for each user, the services which a user wants to consume. Then it
iterates over identifying, for each user, the assumptions underlying the services,
the risks caused by these assumptions, the countermeasures for mitigating these
risks, and the changes to the system speci cations due to these countermeasures.
SSuubb--PPrroocceessss
nnaammee::
        </p>
        <p>Identify:
1. End-users
2. Services</p>
        <p>Identify:
1. Assumptions
2. Risks</p>
        <p>No risk is identified</p>
        <p>Identify:
Yes 21.. CCohuanngteersmineasures</p>
        <p>system specifications
Any risk?</p>
        <p>Yes</p>
        <p>To help the requirements engineer, we formulated a list of questions that the
requirements engineer should ask to check whether the assumptions are in fact
true with respect to speci c users of the system:
- What is the minimum capability that users must have to use this service?
- What procedure must users follow to use this service?
- What does the service assume about the physical location of the user?
- What does the service assume about the identity of the user?
- What assumptions does the service make about the real needs of the user?
- What does the service assume about the time of service consumption?</p>
        <p>Regarding each assumption, further questions can be raised. For example:
When would these assumptions be violated? Can the system discover they are
violated? Can the system still be used when they are violated? Is the system still
useful to use if they are violated? What if they are violated? Who is accountable
for those hazards that materialize?</p>
        <p>After specifying proper countermeasure for each risk, if the countermeasure
Process owner: Version:
change system speci cations, then the system needs to be analyzed again for
new sources of risks. In this regards, we suggest the following \good practices"
that we have adopted in our case study: (a) For each risk, identify a
countermeasure which is implemented by the system in addition to a countermeasure which
is implemented by the users. This promotes the consideration of trade-o s
between countermeasures to be implemented by the system and by the users, and
(b) After the identi cation of countermeasures, reduce the number of di erent
countermeasures by considering their overlap and factor out common aspects.
3</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Initial Validations of the Method</title>
      <p>To test RiDeRS, we applied it to a real-world case three times in increasingly
realistic ways. In this section we describe the case study and the applications.
3.1</p>
      <sec id="sec-3-1">
        <title>Case Organization</title>
        <p>
          The case organization is a care-institution in the Netherlands. This institution
consists of residential blocks where elderly can live and receive care services
provided through professional care-givers. The aim of this institution is to provide
round-the-clock services to their care-receivers and at the same time to enable
them to live an independent life as much and as long as possible. As part of
the U-Care project, we developed a prototype of an IT-based homecare services
platform [
          <xref ref-type="bibr" rid="ref32">32</xref>
          ], to be evaluated in this care-institution. This platform has three
main components, a tailoring platform, a provisioning platform (to integrate and
orchestrate the services) and a collection of application services such as blood
pressure monitoring and medication dispensing. Tailorability of the platform
means that some end-users (e.g., care-givers) can change the behaviour of the
system without help from technical personnel. This introduces additional risks
to the use of the platform, that must be identi ed from the planned eld test. We
call the platform plus third-party providers together in short homecare system.
We performed a eld test of the system in which eight care-receivers and four
care-givers used the system. The next three subsections describe three iterations
through a risk assessment that was part of the RE done for this eld test.
3.2
        </p>
      </sec>
      <sec id="sec-3-2">
        <title>From MOQARE to RiDeRS</title>
        <p>
          We started our RE by applying the MOQARE method de ned by Herrmann
and Paech [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ] to our case, without interacting with domain experts, in order to
test whether this method was usable in this case. We slightly adapted MOQARE
to our case by starting from end-user goals rather than business goals, and by
focussing on risks rather than misuse cases. In the resulting adaptation of
MOQARE, we start with the identi cation of end-users' goals and constrains, and
then we identify risks and countermeasures. We learned that MOQARE could
not be applied as is and required two changes. First, MOQARE represents user
goals, misuse cases, and countermeasures in a tree. This tree became too large
to be usable, and we replaced it by a one-dimensional tabular representation in
which the rst column contained user goals and the second one contained user
constraints. Second, after analyzing the results, we could see that the
countermeasures themselves could be the source of new risks and we should iterate the
process of risk identi cation and countermeasure generation. So we included this
loop in the process. The resulting method was the rst version of RiDeRS.
3.3
        </p>
      </sec>
      <sec id="sec-3-3">
        <title>Lab Test of RiDeRS</title>
        <p>We next validated the usability of RiDeRS with eleven IT experts who acted
as if they were domain experts. We acted as consultants and rst explained the
subjects the objective of applying RiDeRS. Then we explained how to apply
RiDeRS by showing them an example where we apply RiDeRS to care-givers as
a user and presented them with the corresponding table. Next, we provided them
a table to ll the possible risks and countermeasures considering care-receivers
as a user. The table was pre- lled with the labels of goals and constraints of
carereceivers. The task of the participants was to identify possible risks and their
countermeasures. In addition to risks and countermeasures, the participants were
asked to add more constraints to the table which they deem plausible.</p>
        <p>The experiment lasted approximately 30 minutes and all participants succeed
in lling in the tables with possible risks. Most of the countermeasures identi ed
by IT experts were ones that should be provided by the system. For instance, we
gave \lack of IT knowledge and lack of interest in interacting with the system" as
an example of a constraint imposed by care-receivers. Based on this constraint,
an IT expert then identi ed a risk of \not being able or not willing to con rm
to the system of receiving services whenever it is needed". He provided a
countermeasure, which is: \the system should support some other ways of checking
(e.g., video observation) for receiving the services by care-receivers".</p>
        <p>We took away two lessons from this experiment. First, the IT experts
conceptualized the risk analysis in terms of capabilities and limitations of end users,
and we replaced the concept of a constraint imposed by users, with that of
(possibly limited) capabilities of users. Second, our tabular representation of risks and
countermeasures was still not usable and we replaced it with a two-dimensional
table format. The table lists one or more system services vertically, and for each
service lists the assumptions that the environment should satisfy for the system
service to be consumed by an end user. Horizontally, the table lists properties
some users actually have. In the table entries, we list whether this property is
a risk w.r.t. the assumption and if so, what the possible countermeasures could
mitigate or eliminate this risk.</p>
        <p>
          Finally, because the method now focussed on user capabilities, we
restructured the method to follow the assumption-based reasoning from KAOS [
          <xref ref-type="bibr" rid="ref31">31</xref>
          ] and
Jackson's problem-frame approach [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ]: If the environment satis es assumption
A and the system satis es requirement R, then the system will contribute to goal
G. Our assumptions are assumptions about (limited) end-users capabilities, the
requirements are countermeasures to mitigate risks associated with these
limited capabilities, and our goals are end-user goals to perform some health-related
tasks. This updated method was used in the eld test of RiDeRS, described next.
3.4
        </p>
      </sec>
      <sec id="sec-3-4">
        <title>Field Test of RiDeRS</title>
        <p>We validated the usability and usefulness of this updated version of RiDeRS in
the case study with care-givers as domain experts. As with the earlier IT-experts,
we explained to the care-givers the application of RiDeRS and how to apply it
by showing them the care-giver example. We asked them to ll in possible risks
and countermeasures considering the care-receiver as a user. Four care-givers
participated in the experiment for an hour.</p>
        <p>We made two observations based on this eld test. First, it turned out that
care-givers could not imagine any risks when the goals and user capabilities were
stated abstractly. For example, as a goal, we initially speci ed \the care-receiver
use vital sign monitoring services" and as a capability \he has some disabilities".
We needed to make this concrete and speci c, as in for example \the care-receiver
uses a medication dispenser service which requires pressing a button" and the
capability \he has vision impairment", so that they could identify risks.</p>
        <p>The second observation is that in comparison with IT-experts, the care-givers
usually provided user-based countermeasures rather than system-based
countermeasures. For example, for the capability \lack of IT knowledge and lack of
interest in interacting with the system", a care-giver identi ed the risk of \fear of
using the system", she identi ed as countermeasure \training the care-receivers
in using a tablet PC and encouraging them to use it by providing some card game
applications to play on the tablet PC". Thus, working with domain experts in
the eld yielded not only countermeasures that were new system requirements,
but also countermeasures that were requirements that end-users must satisfy.</p>
        <p>The eld test provided yet another lesson, namely that there are more
assumptions relevant for a risk assessment than just the capabilities and
limitations of end-users. Analyzing our data, we identi ed the assumptions listed in
Section 2.1. We should say at the outset that no risk assessment can be
complete, and we do not claim completeness for this one either. However, we do claim
that using RiDeRS made it possible to identify more risks than would otherwise
have been possible, although empirical comparison with other risk assessment
methods remains to be done.
4</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Related Work</title>
      <p>
        In this section, we compare the meta models of other methods with RiDeRS.
We distinguish the following three kinds of methods:
1. Vulnerability-oriented methods - Some methods, such as MOQARE [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ],
consider the system environment only in terms of \vulnerabilities".
Vulnerabilities are properties of the system, users or other actors in the environment
which can cause risks or increase their probability or extent of damage.
Calling them all \vulnerabilities" means treating them jointly, as one group of
concepts, although they are not. When treating vulnerabilities as one
category, the question about vulnerabilities in the elicitation process plays the
role of a very vague trigger, while in RiDeRS the sub-categories o er more
guidance for identifying speci c vulnerabilities. Some other methods that
model vulnerabilities are: van Lamsweerde et al.'s [
        <xref ref-type="bibr" rid="ref31">31</xref>
        ], Lin et al.'s [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ]
problem frames variant, Firesmith's templates [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], the method of the Object
Management Group [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ], the vulnerability-centric requirements engineering
framework of Elahi et al. [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], and RiskREP [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ].
2. Methods which allow modeling vulnerabilities - The following methods
contain concepts which are equivalent to vulnerabilities, although they call them
otherwise. ATAM (Architecture Trade-o Analysis Method) [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ] identi es
Sensitivity Points in an architecture which are critical for the system's
quality. The Misuse Case templates of Sindre and Opdahl [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ] contain three
elds which can contain vulnerabilities, i.e., assumptions, preconditions and
related business rules. The attack patterns of Moore, Ellison and Linger [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ]
contain preconditions for the misuse cases. UMLsec models constraints [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ].
FMEA (Failure Mode and E ect Analysis) [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ] uses tabular templates to
analyze the potential failures in a system or process, each failure's causes and
e ects. The threat modeling extension of the NFR Framework [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] includes
both vulnerabilities and access points. The BSI Standards [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] model complete
processes of security management and guide the search for vulnerabilities.
3. User-oriented methods - Some other methods do not consider the
environment's role but rather focus on the direct interaction between users and
system. These consequently mainly identify risks caused by the users. Such
methods are: Sutcli e and Minocha's scenario templates [
        <xref ref-type="bibr" rid="ref28">28</xref>
        ], the abuse case
model of McDermott and Fox [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ], the NFR Framework of Chung et al. [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ],
Tropos [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], the EMPRESS Quality Models [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], and SecReq [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ].
      </p>
    </sec>
    <sec id="sec-5">
      <title>Conclusions</title>
      <p>This paper presented the conceptual framework RiDeRS and a method for
systematic elicitation of documentation of risk-driven system requirements in a
tabular form. The RiDeRS approach is based on elicitation of risks that arise
from a mismatch of assumptions made by the designer of the system concerning
the environment in which the system will be used. Application of RiDeRS leads
to the identi cation of countermeasures which can prevent or mitigate these
risks. For the domain of homecare, we focus on risks arising from the interaction
of users with the system. RiDeRS results in a table which presents a user's used
services to achieve goals, the services' assumptions, risks arising due to those
incorrect assumptions, and countermeasures to eliminate or mitigate these risks.</p>
      <p>RiDeRS was demonstrated by applying it to a homecare system in an
illustrative case study. IT-based homecare systems are critical systems in which
malfunctions or incorrect usage can threaten the health and/or life of elderly
persons. Moreover, users of the homecare domain, such as care-givers and
carereceivers, have speci c capabilities and limitations. If these do not match with
the assumptions under which the homecare system was designed, this can be a
source of risks, and therefore a risk-based requirement engineering method, such
as that proposed by RiDeRS, must be utilized. It is important to note that such
a method should explicitly and systematically elicit risks and countermeasures.</p>
      <p>
        As a future work, we will observe the system's behavior in the eld test
and seek to identify the actual risks. Then we can do reverse engineering, by
writing those risks in a RiDeRS table, try to identify their associated service
assumptions and user properties. We should also try to understand why we had
not identi ed these risks. Based on these results, we can further identify where
and why the RiDeRS approach requires further re nement. Other future work
includes an experimental comparison of the risks identi ed by RiDeRS and the
risks identi ed by other methods such as Leveson's STAMP method [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ].
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1. Amigo:
          <article-title>Ambient intelligence for the networked home environment project (</article-title>
          <year>2008</year>
          ), available at: http://www.hitechprojects.com/euprojects/amigo
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Avizienis</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          , et al.:
          <article-title>Basic Concepts and Taxonomy of Dependable and Secure Computing</article-title>
          .
          <source>IEEE Trans. Dependable Secur. Comput</source>
          .
          <volume>1</volume>
          (
          <issue>1</issue>
          ),
          <volume>11</volume>
          {
          <fpage>33</fpage>
          (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3. Bundesamt fur Sicherheit in der Informationstechnik:
          <article-title>BSI-Standard 100-3: Risikoanalyse auf der Basis von IT-Grundschutz (</article-title>
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Castro</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kolp</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mylopoulos</surname>
          </string-name>
          , J.:
          <article-title>Towards requirements-driven information systems engineering: the Tropos project</article-title>
          .
          <source>Inf. Syst</source>
          .
          <volume>27</volume>
          ,
          <issue>365</issue>
          {
          <fpage>389</fpage>
          (
          <year>2002</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Chung</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Supakkul</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Capturing and reusing functional &amp; non-functional requirements knowledge: A goal-object pattern approach</article-title>
          . In: IRI. pp.
          <volume>539</volume>
          {
          <issue>544</issue>
          (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6. Dorr, J., et al.:
          <article-title>Quality Models for Non-functional Requirements</article-title>
          .
          <source>IESE-Report Nr. 010</source>
          .04/E (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Du</surname>
            <given-names>us</given-names>
          </string-name>
          , J.,
          <string-name>
            <surname>Brown</surname>
          </string-name>
          , S.,
          <string-name>
            <surname>Fernicola</surname>
          </string-name>
          , N.:
          <article-title>Glossary for chemists of terms used in toxicology</article-title>
          .
          <source>International Union of Pure and Applied Chemistry</source>
          <volume>65</volume>
          ,
          <year>2003</year>
          {
          <volume>2122</volume>
          (
          <year>1993</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Ebenezer</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          , et al.:
          <article-title>Security Threat Modeling and Analysis: A Goal-Oriented Approach</article-title>
          .
          <source>In: 10th Intl. Conf. on Software Engineering and Applications</source>
          (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Elahi</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yu</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zannone</surname>
          </string-name>
          , N.:
          <article-title>A vulnerability-centric requirements engineering framework: analyzing security attacks, countermeasures, and requirements based on vulnerabilities</article-title>
          .
          <source>Requirement Engineering</source>
          <volume>15</volume>
          (
          <issue>1</issue>
          ),
          <volume>41</volume>
          {
          <fpage>62</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Firesmith</surname>
            ,
            <given-names>D.G.</given-names>
          </string-name>
          :
          <article-title>Analyzing and Specifying Reusable Security Requirements</article-title>
          .
          <source>In: Solid Freeform Fabrication Sym</source>
          . pp.
          <volume>507</volume>
          {
          <issue>514</issue>
          (
          <year>2003</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Herrmann</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Morali</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Riskrep: Risk-based security requirements elicitation and prioritization (extended version) (</article-title>
          <year>2010</year>
          ), http://doc.utwente.nl/72721/
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Herrmann</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Paech</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>MOQARE: Misuse-oriented Quality Requirements Engineering</article-title>
          .
          <source>Requirements Engineering</source>
          <volume>13</volume>
          , 73{
          <fpage>86</fpage>
          (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Houmb</surname>
            ,
            <given-names>S.H.</given-names>
          </string-name>
          , et al.:
          <article-title>Eliciting security requirements and tracing them to design: an integration of Common Criteria, heuristics, and UMLsec</article-title>
          . Requirements Engineering - Special Issue on:
          <source>Security Requirements Engineering</source>
          <volume>15</volume>
          , 63{
          <fpage>93</fpage>
          (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14. ISO/IEC: Information technology,
          <article-title>Security techniques, Guidelines for the management of IT Security: Concepts and models</article-title>
          .
          <source>Intl. Std. 13335-1</source>
          (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Jackson</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Problem Frames: Analysing and Structuring Software Development Problems</article-title>
          . Addison-Wesley (
          <year>2000</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16. Jurjens, J.:
          <source>Secure systems development with UML</source>
          . Springer (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Kazman</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Klein</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Clements</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          : ATAM:
          <article-title>Method for Architecture Evaluation</article-title>
          . CMU/SEI-2000
          <string-name>
            <surname>-</surname>
          </string-name>
          TR-
          <volume>004</volume>
          ,
          <string-name>
            <given-names>Software</given-names>
            <surname>Eng</surname>
          </string-name>
          . Inst., Carnegie Mellon University (
          <year>2000</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Korhonen</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Parkka</surname>
            , J., Van Gils,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Health monitoring in the home of the future</article-title>
          .
          <source>Engineering in Medicine and Biology Magazine</source>
          , IEEE
          <volume>22</volume>
          (
          <issue>3</issue>
          ),
          <volume>66</volume>
          {
          <fpage>73</fpage>
          (
          <year>2003</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Leveson</surname>
          </string-name>
          , N.:
          <article-title>Engineering a safer world: Systems thinking applied to safety</article-title>
          . MIT Press (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Lin</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          , et al.:
          <article-title>Analysing Security Threats and Vulnerabilities Using Abuse Frames</article-title>
          .
          <source>Technical Report No. 10</source>
          , The Open University, UK (
          <year>2003</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>McDermott</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fox</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Using Abuse Case Models for Security Requirements Analysis</article-title>
          .
          <source>In: 15th Annual Computer Security Applications Conference</source>
          . pp.
          <volume>55</volume>
          {
          <issue>65</issue>
          (
          <year>1999</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Moore</surname>
            ,
            <given-names>A.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ellison</surname>
            ,
            <given-names>R.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Linger</surname>
            ,
            <given-names>R.C.</given-names>
          </string-name>
          :
          <article-title>Attack modeling for information security and survivability (</article-title>
          <year>2001</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23. Object Management Group:
          <article-title>UML Pro le for Modeling Quality of Service and Fault Tolerance Characteristics and Mechanisms (</article-title>
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Rakitin</surname>
            ,
            <given-names>S.R.</given-names>
          </string-name>
          :
          <article-title>Coping with defective software in medical devices</article-title>
          .
          <source>Computer</source>
          <volume>39</volume>
          , 40{
          <fpage>45</fpage>
          (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Sindre</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Opdahl</surname>
            ,
            <given-names>A.L.</given-names>
          </string-name>
          :
          <article-title>Eliciting security requirements with misuse cases</article-title>
          .
          <source>Requirements Engineering</source>
          <volume>10</volume>
          , 34{
          <fpage>44</fpage>
          (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Sommerville</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sawyer</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          : Requirements Engineering:
          <string-name>
            <given-names>A Good</given-names>
            <surname>Practice</surname>
          </string-name>
          <article-title>Guide</article-title>
          . John Wiley &amp; Sons, Inc., 1st edn. (
          <year>1997</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Stamatis</surname>
            ,
            <given-names>D.H.</given-names>
          </string-name>
          :
          <article-title>Failure Mode and E ect Analysis - FMEA from Theory to Execution</article-title>
          . American Society for Quality Press (
          <year>2003</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28. Sutcli e,
          <string-name>
            <given-names>A.G.</given-names>
            ,
            <surname>Minocha</surname>
          </string-name>
          ,
          <string-name>
            <surname>S.</surname>
          </string-name>
          :
          <article-title>Scenario-based Analysis of Non-Functional Requirements</article-title>
          .
          <source>In: 4th Intl. Workshop on REFSQ</source>
          . pp.
          <volume>219</volume>
          {
          <issue>234</issue>
          (
          <year>1998</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29.
          <article-title>The Council of The European Union: Council conclusions on a safe and e cient healthcare through ehealth</article-title>
          .
          <source>In: O cial Journal of the European Union</source>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          30.
          <article-title>UN-ISDR: Terminology on Disaster Risk Reduction</article-title>
          .
          <source>Geneva</source>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          31.
          <string-name>
            <surname>van Lamsweerde</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          , et al.:
          <article-title>From System Goals to Intruder Anti-Goals: Attack Generation and Resolution for Security Requirements Engineering</article-title>
          .
          <source>In: Workshop on Requirements for High Assurance Systems</source>
          . pp.
          <volume>49</volume>
          {
          <issue>56</issue>
          (
          <year>2003</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          32.
          <string-name>
            <given-names>Zari</given-names>
            <surname>Eslami</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
          , et al.:
          <article-title>Flexible homecare application personalization and integration using pattern-based service tailoring: Supporting independent living of elderly with it</article-title>
          .
          <source>In: 11th Intl. Conf. on CIT</source>
          . pp.
          <volume>467</volume>
          {
          <issue>474</issue>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>