2024
Journal article  Open Access

Evaluating the understandability and user acceptance of Attack-Defense Trees: original experiment and replication

Broccia G., Ter Beek M. H., Lluch Lafuente A., Spoletini P., Fantechi A., Ferrari A.

Security requirements  Attack-Defense Trees  Understandability evaluation  Users acceptance  Empirical user study  Internal replication  Method Evaluation Model 

Context: Attack-Defense Trees (ADTs) are a graphical notation used to model and evaluate security requirements. ADTs are popular because they facilitate communication among different stakeholders involved in system security evaluation and are formal enough to be verified using methods like model checking. The understandability and user-friendliness of ADTs are claimed as key factors in their success, but these aspects, along with user acceptance, have not been evaluated empirically. Objectives: This paper presents an experiment with 25 subjects designed to assess the understandability and user acceptance of the ADT notation, along with an internal replication involving 49 subjects. Methods: The experiments adapt the Method Evaluation Model (MEM) to examine understandability variables (i.e., effectiveness and efficiency in using ADTs) and user acceptance variables (i.e., ease of use, usefulness, and intention to use). The MEM is also used to evaluate the relationships between these dimensions. In addition, a comparative analysis of the results of the two experiments is carried out. Results: With some minor differences, the outcomes of the two experiments are aligned. The results demonstrate that ADTs are well understood by participants, with values of understandability variables significantly above established thresholds. They are also highly appreciated, particularly for their ease of use. The results also show that users who are more effective in using the notation tend to evaluate it better in terms of usefulness. Conclusion: These studies provide empirical evidence supporting both the understandability and perceived acceptance of ADTs, thus encouraging further adoption of the notation in industrial contexts, and development of supporting tools.

Source: INFORMATION AND SOFTWARE TECHNOLOGY, vol. 178



Back to previous page
BibTeX entry
@article{oai:iris.cnr.it:20.500.14243/511798,
	title = {Evaluating the understandability and user acceptance of Attack-Defense Trees: original experiment and replication},
	author = {Broccia G. and Ter Beek M.  H. and Lluch Lafuente A. and Spoletini P. and Fantechi A. and Ferrari A.},
	year = {2024}
}

CODECS
Maximising the CO-benefits of agricultural Digitalisation through conducive digital ECoSystems

Secure Internet of Things – Risk analysis in design and operation
Secure Internet of Things – Risk analysis in design and operation

Security-by-Design in Digital Denmark
Security-by-Design in Digital Denmark

Typeful Language Adaptation for Dynamic, Interacting and Evolving Systems
Typeful Language Adaptation for Dynamic, Interacting and Evolving Systems


OpenAIRE