Browse > Article
http://dx.doi.org/10.3837/tiis.2014.06.018

Enhancement of VECTOR Method by Adapting OCTAVE for Risk Analysis in Legacy System Migration  

Hakemi, Aida (Faculty of Computing, Universiti Teknologi Malaysia (UTM))
Jeong, Seung Ryul (Graduate School of Buinsess Information Technology, Kookmin University)
Ghani, Imran (Faculty of Computing, Universiti Teknologi Malaysia (UTM))
Sanaei, Mojtaba Ghanaatpisheh (Faculty of Computing, Universiti Teknologi Malaysia (UTM))
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.8, no.6, 2014 , pp. 2118-2138 More about this Journal
Abstract
Risks are involved in all phases of the software life cycle, and due to these risks, software can face various problems that can cause different negative outcomes and sometimes, in extreme cases, the failure of the software. Most of these risks lie in the legacy software migration process. These risks can create many problems, and in the worst case they can lead to the failure of the migration project. This paper explores different types of risk analysis methods such as CRAMM, CORAS, OCTAVE and VECTOR. After comparing these methods, the two suitable methods were chosen, namely, OCTAVE and VECTOR. Based on the use of these two methods, the project suggests an enhanced EOV method for risk analysis in the migration of legacy software.
Keywords
Risk analysis; software life cycle; migration of legacy software; OCTAVE; VECTOR;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Patterson, F. D., & Neailey, K., "A Risk Register Database System to aid the management of project risk," International Journal of Project Management, 20(5), pp. 365-374, 2002.   DOI   ScienceOn
2 Talabis, M., & Martin, J., "Chapter 2 - Information Security Risk Assessment: A Practical Approach, In Information Security Risk Assessment Toolkit," Boston: Syngress, pp. 27-62, 2013.
3 Tsiakis, T., "Information Security Expenditures: a Techno-Economic Analysis," International Journal of Computer Science and Network Security (IJCSNS), 10(4), pp. 7-11, 2010.
4 Vorster, A., & Labuschagne, L., "A framework for comparing different information security risk analysis methodologies," In Proc. of Paper presented at the Proceedings of the 2005 annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countries, White River, South Africa, 2005.
5 McGill, William L., Bilal M. Ayyub, and Mark Kaminskiy, "Risk analysis for critical asset protection," Risk Analysis, 27 no. 5, pp. 1265-1281, 2007.
6 Christopher Alberts, Audrey Dorofee, James Stevens, and Carol Woody. "Introduction to the OCTAVE Approach," Pittsburgh, PA, Carnegie Mellon University, 2003.
7 Choudhari, J., & Suman, U., "Story Points Based Effort Estimation Model for Software Maintenance," Procedia Technology 4, pp761-765, 2012.   DOI   ScienceOn
8 Yazar, Zeki. "A qualitative risk analysis and management tool-CRAMM," SANS InfoSec Reading Room White Paper, 2002.
9 Davor Macek, I. M., Nikola Ivkovic, Information Security Risk Assessment in Financial Institutions Using VECTOR Matrix and OCTAVE Methods. 2011.
10 Moorthy, Jayaletchumi T. Sambantha, Suhaimi Ibrahim, and Mohd Naz'ri Mahrin, "The Need For Usability Risk Assessment Model," In Proc. of The Second International Conference on Informatics Engineering & Information Science (ICIEIS2013), The Society of Digital Information and Wireless Communication, pp. 215-220, 2013.
11 Moorthy, Jayaletchumi Sambantha, Suhaimi bin Ibrahim, and Mohd Naz'ri Mahrin, "Developing Usable Software Product Using Usability Risk Assessment Model," International Journal of Digital Information and Wireless Communications (IJDIWC) 4, no. 1, pp. 95-102, 2014.
12 Er, M. C., Problems and solutions in software maintenance. Data Processing, 26(6), 25-27. 1984.
13 Bisbal, Jesus, Deirdre Lawless, B. Wu, J. Grimson, V. Wade, R. Richardson, and D. O'Sullivan. "A survey of research into legacy system migration," Technique report, 1997.
14 Martin Butler, B. W., Reducing Costs and Improving Agility Through Legacy Migration, 2010.
15 Jalote, Pankaj, "Software Requirements Analysis and Specification," In An Integrated Approach to Software Engineering, Springer New York, pp. 73-158, 1997.
16 Ketil Stolen, F. d. B., Theo Dimitrakos, Rune Fredriksen, Model-based risk assessment - the CORAS approach.
17 Mahmoodian, N., Abdullah, R., & Murad, M. A. A., "Text-based classification incoming maintenance requests to maintenance type," In Proc. of 2010 International Symposium in Paper presented at the Information Technology (ITSim), 15-17 June, 2010.
18 Muhammad Inayat Ullah, M. S., Nazir Muhammad, Reduction of enhanced maintenance effort using ARM model and RMMM plan, 2010.
19 Wiegers, Karl, "Know your enemy: software risk management," Software Development-San Francisco- 6, pp. 38-44, 1998.
20 Erdil, Kagan, Emily Finn, Kevin Keating, Jay Meattle, Sunyoung Park, and Deborah Yoon, "Software maintenance as part of the software life cycle," Comp180: Software Engineering Project, 2003.
21 Behnia, Armaghan, Rafhana Abd Rashid, and Junaid Ahsenali Chaudhry, "A survey of information security risk analysis methods," Smart Computing Review 2, no. 1, pp. 279-94, 2012.
22 C. Alberts, Audree Dorofee, James Stevens, Carol Woody, Introduction to the OCTAVE Approach, Pittsburgh, PA: 15213-3890, Carnegie Mellon, Sotfware Engineering Institute, August, 2003.
23 Wu, Bing, Deirdre Lawless, Jesus Bisbal, Jane Grimson, Vincent Wade, Donie O'Sullivan, and Ray Richardson, "Legacy systems migration-a method and its tool-kit framework," In Proc. of Software Engineering Conference, Asia Pacific and International Computer Science Conference 1997. APSEC'97 and ICSC'97. Proceedings, pp. 312-320. IEEE, 1997.
24 Breier, J., & Hudec, L., "Risk analysis supported by information security metrics," In Proc. of Paper presented at the Proceedings of the 12th International Conference on Computer Systems and Technologies, Vienna, Austria, 2011.
25 Marek, P., and J. Paulina. "The OCTAVE methodology as a risk analysis tool for business resources," In Proc. of International Multiconference Computer Science and IT, Hong Kong. 2006.