2 results
Search Results
Now showing 1 - 2 of 2
Conference Object Citation - Scopus: 1Biletini Devret: a Secure Mobile App for Ticket Sales(Ieee, 2021) Ak, Firat; Ozkan, Veli Batuhan; Gonder, Gokhan; Sumeroglu, Ersun; Eryilmaz, MeltemIt has been known that smartphones are the first thing that comes to mind when technology is mentioned. Almost every person has a smartphone, and they are used for social media, shopping, trade, and more. In the past, phones were just used for calculating something, or text messaging each other. However, nowadays, as mentioned above, they are used for complicated applications or works. Therefore, users need security for their private information. The Biletini Devret application in this study keeps users' private information secure with the help of Google Cloud Platforms and this application has two-factor verification to be more secure and to prevent unauthorized users. In particular, the Biletini Devret application has a Face Recognition System which has the most reliable authentication system all in the world.Article Citation - WoS: 5Citation - Scopus: 6Enhancing Misuse Cases With Risk Assessment for Safety Requirements(Ieee-inst Electrical Electronics Engineers inc, 2020) Arogundade, Oluwasefunmi T.; Misra, Sanjay; Abayomi-Alli, Olusola O.; Fernandez-Sanz, LuisRisk-driven requirements elicitation represents an approach that allows assignment of appropriate countermeasure for the protection of the Information System (IS) depending on the risk level. Elicitation of safety requirements based on risk analysis is essential for those IS which will run on the open and dynamic Internet platform. Traditionally, misuse cases are used to find the weak points of an IS but cannot differentiate between the weak point that can lead to lenient hazard and/or serious hazard. In this paper, we present an enhanced misuse case approach to support IS safety risk assessment at the early stages of software process. We extensively examined and identified concepts which constitute a modelling technique for IS safety risk assessment and build a conceptual model for achieving IS safety risk assessment during the requirement analysis phase of software process. The risk assessment process follows an approach of consequential analysis based on misuse cases for safety hazard identification and qualitative risk measurement. The safety requirements are elicited according to the results of the risk assessment. A medical IS is used as a case study to validate the proposed model.

