Broccia G., Ter Beek M. H., Lluch Lafuente A., Spoletini P., Fantechi A., Ferrari A.
Security requirements Attack-Defense Trees Understandability evaluation Users acceptance Empirical user study Internal replication Method Evaluation Model
Context: Attack-Defense Trees (ADTs) are a graphical notation used to model and evaluate security requirements. ADTs are popular because they facilitate communication among different stakeholders involved in system security evaluation and are formal enough to be verified using methods like model checking. The understandability and user-friendliness of ADTs are claimed as key factors in their success, but these aspects, along with user acceptance, have not been evaluated empirically. Objectives: This paper presents an experiment with 25 subjects designed to assess the understandability and user acceptance of the ADT notation, along with an internal replication involving 49 subjects. Methods: The experiments adapt the Method Evaluation Model (MEM) to examine understandability variables (i.e., effectiveness and efficiency in using ADTs) and user acceptance variables (i.e., ease of use, usefulness, and intention to use). The MEM is also used to evaluate the relationships between these dimensions. In addition, a comparative analysis of the results of the two experiments is carried out. Results: With some minor differences, the outcomes of the two experiments are aligned. The results demonstrate that ADTs are well understood by participants, with values of understandability variables significantly above established thresholds. They are also highly appreciated, particularly for their ease of use. The results also show that users who are more effective in using the notation tend to evaluate it better in terms of usefulness. Conclusion: These studies provide empirical evidence supporting both the understandability and perceived acceptance of ADTs, thus encouraging further adoption of the notation in industrial contexts, and development of supporting tools.
Source: INFORMATION AND SOFTWARE TECHNOLOGY, vol. 178
@article{oai:iris.cnr.it:20.500.14243/511798, title = {Evaluating the understandability and user acceptance of Attack-Defense Trees: original experiment and replication}, author = {Broccia G. and Ter Beek M. H. and Lluch Lafuente A. and Spoletini P. and Fantechi A. and Ferrari A.}, year = {2024} }
CODECS
Maximising the CO-benefits of agricultural Digitalisation through conducive digital ECoSystems
Secure Internet of Things – Risk analysis in design and operation
Secure Internet of Things – Risk analysis in design and operation
Security-by-Design in Digital Denmark
Security-by-Design in Digital Denmark
Typeful Language Adaptation for Dynamic, Interacting and Evolving Systems
Typeful Language Adaptation for Dynamic, Interacting and Evolving Systems