there”. We will discuss a systematic process “how
we do that” in future work.
6.4 Conclusions
The systematic and repeatable process allows
capability planners to develop and prioritize
capabilities and assess the gain/ impact before
making project proposals or even making serious
investments.
The feedback from program managers that have
used this process for large project capability
planning (projects that continue for several years)
have been very positive and they have confirmed
that application and demonstration of this process as
part of their capability planning has increased the
creditability of their plans.
ACKNOWLEDGEMENTS
Authors would like to express sincere gratitude to
Dr. D. Walsh for his innovative leadership.
REFERENCES
CSE, (2005). Threat and Risk Assessment Working Guide,
viewed January 2007, <http://www.cse-
cst.gc.ca/publications/gov-pubs/itsg/itsg04-e.html>.
McGraw, Gary (2006a). Software Security: Building
Security In, Addison–Wesley, New York.
McGraw, Gary (2006b). Architectural Risk Analysis,
Viewed November 2007, <http://www.devsource.com/
article2/0,1895,1928687,00.asp>.
IBM (2003). Risk reduction with the RUP phase plan,
Viewed November 2007, <http://www.ibm.com/
developerworks/rational/library/1826.html>.
HP (2007). Planning for Disaster: Assessing Risks to Your
Business Data, Viewed November 2007,
<http://www.score.org/pdf/HP_Download_Planningfo
rDisaster.pdf>.
Kotonya, Gerald, & Rashid, Awais (2001). A Strategy for
Managing Risk in Component–based Software
Development. Proceedings of the 27th EUROMICRO
Conference 2001: A Net Odyssey (EUROMICRO’01),
pp. 12-22.
NASA (2003). XML Business Case, Robert Benedict,
NASA, Washington.
NASA (2004). NASA Activities in Risk Assessment,
Project Management Conference 2004, Michael G.
Stamatelatos, NASA, Washington.
Houmb, S.H., Georg, G., France, R., Bieman, J., Jurjens, J.
(2005). Cost-benefit trade-off analysis using BBN for
aspect-oriented risk-driven development. Proceedings
of the 10th IEEE International Conference on
Engineering of Complex Computer Systems, pp. 195-
204.
Williams, Ray, Ambrose, Kate, Bentrem, Laura,
Merendino, Tom (2004). Risk Based Diagnostics,
Carnegie Mellon Software Engineering Institute for
the Department of Defense, Pittsburgh.
Choudhary, A. Rahim, (2005). A Policy Based
Architecture for NSA RAdAC Model. Proceedings of
the 6
th
IEEE IA Workshop, pp. 10.
Wikipedia (2007). Social Network, Viewed November 2007,
http://en.wikipedia.org/wiki/Social_network_analysis.
The Bumble Bee (2006). Social Network Analysis: An
Introduction, Viewed November 2007,
<http://www.bioteams.com/2006/03/28/social_networ
k_analysis.html>.
Liemur (2005). Risk Based Software Development:
Reducing Risk and Increasing the Probability of
Project Success, Viewed November 2007,
<http://www.liemur.com/Articles/Risk_Based_Softwa
re_Development.html>.
Custers, B. H. M. (2007). Risk Profiling of Money
Laundering and Terrorism Funding - Practical
Problems of Current Information Strategies. ICEIS
2007 Conference Proceedings, pp. 90-94.
Gulías, Víctor M., Abalde, Carlos, Castro, Laura M.,
Varela, Carlos (2006). Formalisation of a Functional
Risk Management System. ICEIS 2006 Conference
Proceedings, pp. 516-519.
Misra, Subhas C., Kumar, Vinod, Kumar, Uma (2005).
Modeling Strategic Actor Relationships to Support
Risk Analysis and Control in Software Projects.
ICEIS 2005 Conference Proceedings, pp. 288-293.
Enström, David W., Walsh, D'Arcy, Hossendoust, Siavosh
(2007). A Reference Model for Enterprise Security -
High Assurance Enterprise Security. ICEIS 2007
Conference Proceedings, pp. 355-364
ICEIS 2008 - International Conference on Enterprise Information Systems
276