4 Conclusion
We have outlined a new technique for modeling information system security risk
analysis using the concept of actor-dependency, and extending its scope to the domain
of security risk management. The technique can reason about the opportunities, vul-
nerabilities, changes, and risks that are associated with information systems security,
and can incorporate prominently the issues related to security risk.
i* was not originally designed for studying security risks. We have leveraged the
concept of actor-dependency of i*, extended it to address its limitations for use in
security risk management We recommend further research to design a new language
for modeling actor-dependencies in security risk management.
References
1. Aagedal, J.O., Braber, F. D., Dimitrakos, T., Gran, B.A., Raptis, D., Stolen, K.: Model-
Based Risk Assessment to Improve Enterprise Security. In Proceedings of the Fifth Inter-
national Enterprise Distributed Object Computing Conference (EDOC 2002), September
17-20, Lausanne, Switzerland (2002)
2. Barber, B., and Davey, J.: The use of the CCTA Risk Analysis and Management Methodol-
ogy (CRAMM) in health information systems. In: Medinfo 92. Amsterdam: North Holland
(1992) 1589-1593.
3. Chung, L., Nixon, B.A., Yu, E., Mylopoulos, J. Non-Functional Requirements in Software
Engineering, Kluwer Academic Publishers (2000)
4. Common Criteria Organization: Common Criteria for Information Technology Security
Evaluation. http://www.commoncriteria.org, accessed: 2004 (2002)
5. Control Objectives for Information and Related Technology, 2002. “COBIT”.
http://www.isaca.org/ct-denld.htm (2002)
6. Donzelli, P., Bresciani, P.: An Agent-Based Requirements Engineering Framework for
Complex Socio-Technical Systems. In Proceedings of SELMAS 2003, Portland (2003)
7. Dubois, E., Yu, E. and Petit, M.: From Early to Late Formal Requirements: a Process Con-
trol Case Study. In Proc. 9th International Workshop on Software Specification and De-
sign, April 16-18, Ise-Shima, Japan (1998) 34-42.
8. Gans, G., Jarke, M., Kethers, S., Lakemeyer, G., Ellrich, L., Funken, C., Meister, M.: Re-
quirements Modeling for Organization Networks: A (Dis)Trust-Based Approach, In Proc.
5th IEEE International Symposium on Requirements Engineering, Toronto (2001)
9. Mouratidis, H., Giorgini, P., Manson, G., Philip, I.: A Natural Extension of Tropos Meth-
odology for Modeling Security. In Proceedings of the Agent Oriented Methodologies
Workshop (OOPSLA 2002), November, Seattle-USA (2002)
10. Reactive System Design Support: RSDS. http://www.kcl.ac.uk., Sandia National Laborato-
ries (2002)
11. Schechter, S.E: Computer Security & Risk: A Quantitative Approach. Ph.D. Thesis, Com-
puter Science, Harvard University (2004)
12. Standards Australia: AS/NZS 4360: Risk Management. AS/NZS 4360 (1999)
13. Sutcliffe, A.G. and Minocha, S: Linking Business Modeling to Socio-technical System
Design, In Proceedings of CaiSE’99 (1999) 73-87.
14. Vraalsen, F., Braber, F.D., Hogganvik, I., Lund, S., Stolen, K: The CORAS Tool-
Supported Methodology. SINTEF Report, Report # STF90A04015, February, Norway
(2004)
262