Skip to main content

Identifying Safety Hazards: An Experimental Comparison of System Diagrams and Textual Use Cases

  • Conference paper
Enterprise, Business-Process and Information Systems Modeling (BPMDS 2012, EMMSAD 2012)

Abstract

As ICT is increasingly used in critical systems, safety is a growing concern. Safety hazards should be discovered and handled at an early stage of IS development, since it is much more expensive to redesign a system post hoc due to threats that were initially overlooked. It is therefore interesting to integrate safety analysis with textual and diagrammatic specifications used in mainstream system development. This paper reports on an experiment comparing how well system diagrams and textual uses cases support the identification of hazards in a simple railway control system. The two most important conclusions are that textual uses cases are as good as or better than system diagrams for hazard identification in all cases except for peripheral equipment and that including system diagrams in the documentation is not enough − they must be brought into focus for the analysis.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Croxford, M., Sutton, J.: Breaking through the V and V Bottleneck. In: Toussaint, M.-J. (ed.) Ada-Europe 1995. LNCS, vol. 1031, pp. 344–354. Springer, Heidelberg (1996)

    Chapter  Google Scholar 

  2. Jürjens, J.: Developing Safety-Critical Systems with UML. In: Stevens, P., Whittle, J., Booch, G. (eds.) UML 2003. LNCS, vol. 2863, pp. 360–372. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  3. Bush, D.: Modelling Support for Early Identification of Safety Requirements: A Preliminary Investigation. In: Firesmith, D. (ed.) 4th Int’l Workshop on Requirements for High Assurance Systems (RHAS 2005), Paris, France (2005)

    Google Scholar 

  4. Abdel-Hamid, T.K.: The Economics of Software Quality Assurance: A Simulation Based Case Study. MIS Quarterly (1988)

    Google Scholar 

  5. Lutz, R.R.: Analyzing software requirements errors in safety-critical, embedded systems. In: Proceedings of IEEE International Symposium on Requirements Engineering (1993)

    Google Scholar 

  6. Allenby, K., Kelly, T.: Deriving Safety Requirements Using Scenarios. In: Fifth IEEE International Symposium on Requirements Engineering (RE 2001). IEEE, Toronto (2001)

    Google Scholar 

  7. Berry, D.M.: The Safety Requirements Engineering Dilemma. In: Proceedings of the 9th International Workshop on Software Specification and Design, p. 147. IEEE Computer Society (1998)

    Google Scholar 

  8. Stålhane, T., Sindre, G.: A Comparison of Two Approaches to Safety Analysis Based on Use Cases. In: Parent, C., Schewe, K.-D., Storey, V.C., Thalheim, B. (eds.) ER 2007. LNCS, vol. 4801, pp. 423–437. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  9. Stålhane, T., Sindre, G.: Safety Hazard Identification by Misuse Cases: Experimental Comparison of Text and Diagrams. In: Czarnecki, K., Ober, I., Bruel, J.-M., Uhl, A., Völter, M., et al. (eds.) MODELS 2008. LNCS, vol. 5301, pp. 721–735. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  10. Stålhane, T., Sindre, G., du Bousquet, L.: Comparing Safety Analysis Based on Sequence Diagrams and Textual Use Cases. In: Pernici, B. (ed.) CAiSE 2010. LNCS, vol. 6051, pp. 165–179. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  11. Stamatis, D.H.: Failure Mode and Effect Analysis: FMEA from theory to execution. American Society for Quality (ASQ), Milwaukee (1995)

    Google Scholar 

  12. Sindre, G., Opdahl, A.L.: Eliciting Security Requirements with Misuse Cases. Requirements Engineering 10(1), 34–44 (2005)

    Article  Google Scholar 

  13. Turner, C.W., Lewis, J.R., Nielsen, J.: Determining Usability Test Sample Size. In: Karwowski, W. (ed.) International Encyclopedia of Ergonomics and Human Factors, pp. 3084–3088. CRC Press, Boca Raton (2006)

    Google Scholar 

  14. Bernardi, S., Merseguer, J., Petriu, D.C.: Dependability modeling and analysis of software systems specifiec with UML. ACN Computng Surveys (2011)

    Google Scholar 

  15. Iwu, S.E.A.: Integrating safety and formal analyses using UML and PFS. Reliability Engineering and Systems Safety 92(2), 49–65 (2007)

    Article  Google Scholar 

  16. Allmendinger, L.: Diagrams and Design Tools in Context. ACM SIGDOC Asterisk Journal of Computer Documentation 18(4), 25–41 (1994)

    Article  Google Scholar 

  17. Guiochet, J., Vilchis, A.: Safety Analysis of a Medical Robot for Tele-echography. In: Proc. 2nd IARP IEEE/RAS Joint Workshop on Technical Challenge for Dependable Robots in Human Environments, Toulouse, France, pp. 217–227 (2002)

    Google Scholar 

  18. Lu, S., Halang, W.A., Zalewski, J.: Component-based HazOp and Fault Tree Analysis in Developing Embedded Real-Time Systems with UML. In: Proceedings of the 4th WSEAS International Conference on Electronics, Control and Signal Processing, pp. 150–155 (2005)

    Google Scholar 

  19. Leveson, N.G.: Safeware: System Safety and Computers. Addison-Wesley, Boston (1995)

    Google Scholar 

  20. Lauritsen, T., Stålhane, T.: Safety Methods in Software Process Improvement. In: Richardson, I., Abrahamsson, P., Messnarz, R. (eds.) EuroSPI 2005. LNCS, vol. 3792, pp. 95–105. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  21. Martin-Guillerez, D., et al.: A UML-based method for risk analysis of human-robot interactions. In: 2nd International Workshop on Software Engineering for Resilient Systems. Birkbeck College, London (2010)

    Google Scholar 

  22. Jarzebowicz, A., Gorski, J.: Empirical Evaluation of Reading Techniques for UML Models Inspection. International Transactions on System Science and Applications 1(2), 103–110 (2006)

    Google Scholar 

  23. Törner, F., Johannessen, P., Öhman, P.: Assessment of Hazard Identification Methods for the Automotive Domain. In: Górski, J. (ed.) SAFECOMP 2006. LNCS, vol. 4166, pp. 247–260. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  24. Davis, F.D., Bagozzi, R.P., Warshaw, P.R.: User Acceptance of Computer Technology: A Comparison of Two Theoretical Models. Management Science 35(8), 982–1003 (1989)

    Article  Google Scholar 

  25. Hopkins, W.G.: A New View of Statistics. Brisbane, University of Queensland (2001)

    Google Scholar 

  26. Wohlin, C., et al.: Experimentation in Software Engineering: An Introduction. Kluwer Academic, Norwell (2000)

    Book  Google Scholar 

  27. Tukey, J.W.: Data analysis and behavioral science or learning to bear the quantitative’s man burden by shunning badmandments. In: Tukey, J.W., Jones, L.W. (eds.) The Collected Works, pp. 187–389. Wadsworth, Monterey (1986)

    Google Scholar 

  28. Runeson, P.: Using Students as Experiment Subjects – An Analysis on Graduate and Freshmen Student Data. In: Linkman, S. (ed.) Proc. 7th International Conference on Empirical Assessment & Evaluation in Software Engineering (EASE 2003), pp. 95–102. Keele University, Staffordshire (2003)

    Google Scholar 

  29. Wright, G., Bolger, F., Rowe, G.: An Empirical Test of the Relative Validity of Expert and Lay Judgement of Risk. Risk Analysis 22(6), 1107–1122 (2002)

    Article  Google Scholar 

  30. Coll, R.A., Coll, J.H., Thakur, G.: Graphs and tables: a four factor experiment. Communications of the ACM 37(4), 77–84 (1994)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Stålhane, T., Sindre, G. (2012). Identifying Safety Hazards: An Experimental Comparison of System Diagrams and Textual Use Cases. In: Bider, I., et al. Enterprise, Business-Process and Information Systems Modeling. BPMDS EMMSAD 2012 2012. Lecture Notes in Business Information Processing, vol 113. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31072-0_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-31072-0_26

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-31071-3

  • Online ISBN: 978-3-642-31072-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics