Eelco Vriezekolk

Learn More
[Context and motivation] It is desirable that requirement engineering methods are reliable, that is, that methods can be repeated with the same results. Risk assessments methods, however, often have low reliability when they identify risk mitigations for a system based on expert judgement. [Question/problem] Our goal is to assess the reliability of an(More)
—In this paper we consider service-oriented applications composed of component services provided by different, economically independent service providers. As in all composite applications , the component services are composed and configured to meet requirements for the composite application. However, in a field experiment of composite service-oriented(More)
In this paper, we discuss possible risks posed by the application of tailorable context-aware systems in real-life practices. We use a tailorable context-aware system in the homecare domain as a case study to identify and analyse such risks. Next, we discuss which of these risks can be generalized to the use of tailorable context-aware system in other(More)
Telecommunication services are essential to modern information systems, especially so for crisis management. Telecoms systems are complex and difficult to analyse. Current risk assessment methods are either not used because of their complexity, or lack rigorous argumentation to justify their results because they are oversimplified. Our challenge has been to(More)
  • 1