000914598 000__ 05105cam\a2200553Ii\4500 000914598 001__ 914598 000914598 005__ 20230306150400.0 000914598 006__ m\\\\\o\\d\\\\\\\\ 000914598 007__ cr\cn\nnnunnun 000914598 008__ 190919s2019\\\\sz\a\\\\o\\\\\101\0\eng\d 000914598 020__ $$a9783030280055$$q(electronic book) 000914598 020__ $$a3030280055$$q(electronic book) 000914598 020__ $$z9783030280048 000914598 0247_ $$a10.1007/978-3-030-28005-5$$2doi 000914598 035__ $$aSP(OCoLC)on1120052443 000914598 035__ $$aSP(OCoLC)1120052443 000914598 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dUKMGB$$dOCLCF$$dEBLCP 000914598 049__ $$aISEA 000914598 050_4 $$aQA76.76.D47 000914598 08204 $$a005.1$$223 000914598 1112_ $$aEuroSPI (Conference)$$n(26th :$$d2019 :$$cEdinburgh, Scotland) 000914598 24510 $$aSystems, Software and Services Process Improvement :$$b26th European Conference, EuroSPI 2019, Edinburgh, UK, September 18-20, 2019, Proceedings /$$cAlastair Walker, Rory V. O'Connor, Richard Messnarz (eds.). 000914598 2463_ $$aEuroSPI 2019 000914598 264_1 $$aCham, Switzerland :$$bSpringer,$$c2019. 000914598 300__ $$a1 online resource (xxi, 771 pages) :$$billustrations. 000914598 336__ $$atext$$btxt$$2rdacontent 000914598 337__ $$acomputer$$bc$$2rdamedia 000914598 338__ $$aonline resource$$bcr$$2rdacarrier 000914598 4901_ $$aCommunications in computer and information science,$$x1865-0929 ;$$v1060 000914598 500__ $$aInternational conference proceedings. 000914598 500__ $$aIncludes author index. 000914598 5050_ $$aIntro; Preface; Recommended Further Reading; References; Acknowledgments; Organization; Contents; Visionary Papers; A Critical Discussion of Some Current and Future Developments of IT; Abstract; 1 The Ambivalence of Current and Future IT Developments; 1.1 Moving Activities into the Web; 1.2 Information Digitization; 1.3 Finding Reliable Information in the Web and Social Networks; 1.4 Artificial Intelligence (AI); 1.5 Big Data and Big Data Analysis; 1.6 Other Issues; 2 Some Novel Ideas to Avoid Some Dangers of New IT Technology; 2.1 Moving Activities into the Web; 2.2 Information Digitization 000914598 5058_ $$a2.3 Finding Reliable Information in the Web and Social Networks2.4 Artificial Intelligence (AI); 2.5 Big Data and Big Data Analysis; 2.6 Other Issues; 3 Conclusion and a Warning of Hubris; References; The Quest for Infrastructures and Engineering Methods Enabling Highly Dynamic Autonomous Systems; 1 Introduction; 2 Autonomous Driving; 3 Industry 4.0 -- Production of the Future; 4 Towards the Decimeter Internet; 5 Dependability Engineering of Adaptive Systems; 6 Conclusion; References; Shifting Paradigms in Innovation Management -- Organic Growth Strategies in the Cloud; Abstract; 1 Introduction 000914598 5058_ $$a2 Factors Influencing the Innovation Strategies2.1 Innovation Influenced by Engineering Philosophy; 2.2 Innovation Influenced by Culture -- Still Not Considered Enough; 2.3 Innovation and the 6th Kontradieff Cycle -- Speed Is Increasing; 2.4 Innovation and Positive Leadership; 3 New Cloud Driven Innovation Patterns; 3.1 Cloud Driven Strategies Are Already in Place; 3.2 List of Innovation Patterns Applying the Cloud Environment; 4 Cloud-Driven Strategies Framework; 4.1 Goals for a Cloud Driven Innovation Strategy; 4.2 A Profile of Critical Mass Factors; 5 Relationship with the SPI Manifesto 000914598 5058_ $$aAcknowledgementsReferences; SPI and Safety and Security; RISKEE: A Risk-Tree Based Method for Assessing Risk in Cyber Security; 1 Introduction; 2 Background and Related Work; 2.1 Towards Unified Quantitative Risk Assessment of Safety and Security; 2.2 FAIR; 3 Contribution: The RISKEE Method; 3.1 Structure and Framework; 3.2 Using RISKEE; 3.3 Process; 3.4 Calculation of Risk; 3.5 Computations on Probability Distributions; 3.6 Threats to Validity and Limitations; 4 Conclusion and Future Work; References; Designing and Integrating IEC 62443 Compliant Threat Analysis; 1 Introduction 000914598 5058_ $$a2 Overview of the Secure Development Lifecycle3 Threat Analysis Compliant with IEC 62443; 3.1 Initial Situation; 3.2 Threat Analysis Requirements; 3.3 Threat Analysis Solution; 3.4 Requirements Fulfillment; 4 Lessons Learned; 4.1 Findings Concerning the Process; 4.2 Findings Concerning the Threat Analysis; 4.3 Further Findings; 5 Conclusion; References; Extending the Shell Model via Cause/Consequence Analysis of Component Failures; Abstract; 1 Introduction; 2 Related Work; 3 Shell Model Background; 4 Extending the Shell Model; 4.1 Consequence Analysis Using Modified FMEA 000914598 506__ $$aAccess limited to authorized users. 000914598 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed September 19, 2019). 000914598 650_0 $$aComputer software$$xDevelopment$$vCongresses. 000914598 650_0 $$aComputer software$$xQuality control$$vCongresses. 000914598 650_0 $$aSoftware engineering$$vCongresses. 000914598 7001_ $$aWalker, Alastair,$$eeditor. 000914598 7001_ $$aO'Connor, Rory V.,$$eeditor. 000914598 7001_ $$aMessnarz, Richard,$$eeditor. 000914598 830_0 $$aCommunications in computer and information science ;$$v1060. 000914598 852__ $$bebk 000914598 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-030-28005-5$$zOnline Access$$91397441.1 000914598 909CO $$ooai:library.usi.edu:914598$$pGLOBAL_SET 000914598 980__ $$aEBOOK 000914598 980__ $$aBIB 000914598 982__ $$aEbook 000914598 983__ $$aOnline 000914598 994__ $$a92$$bISE