Applying the physics of notation to the evaluation of a security and privacy requirements engineering methodology

被引:4
作者
Diamantopoulou, Vasiliki [1 ,2 ]
Mouratidis, Haralambos [1 ]
机构
[1] Univ Brighton, Sch Comp Engn & Math, Ctr Secure Usable & Intelligent Syst CSIUS, Brighton, E Sussex, England
[2] Univ Aegean, Sch Sci, Dept Informat & Commun Syst Engn, Chios, Greece
关键词
Evaluation; Information security modelling; Computer privacy; Security requirements engineering; Privacy requirements engineering; Physics of notation;
D O I
10.1108/ICS-12-2017-0087
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Purpose The purpose of this study is the analysis of a security and privacy requirements engineering methodology. Such methodologies are considered an important part of systems' development process when they contain and process a large amount of critical information, and thus need to remain secure and ensure privacy. Design/methodology/approach These methodologies provide techniques, methods and norms for tackling security and privacy issues in information systems. In this process, the utilisation of effective, clear and understandable modelling languages with sufficient notation is of utmost importance, as the produced models are used not only among IT experts or among security specialists but also for communication among various stakeholders, in business environments or among novices in an academic environment. Findings The qualitative analysis revealed a partial satisfaction of these principles. Originality/value This paper evaluates the effectiveness of a security and privacy requirements engineering methodology, namely, Secure Tropos, on the nine principles of the theory of notation.
引用
收藏
页码:382 / 400
页数:19
相关论文
共 41 条
[1]  
Alexander Christopher., 1964, NOTES SYNTHESIS FORM, V5
[2]  
Avison D., 2003, INFORM SYSTEMS DEV M
[3]   Humans prefer curved visual objects [J].
Bar, Moshe ;
Neta, Maital .
PSYCHOLOGICAL SCIENCE, 2006, 17 (08) :645-648
[4]  
Bertin J., 2011, SEMIOLOGY GRAPHICS D
[5]  
Butler J., 2003, UNIVERSAL PRINCIPLES
[6]  
Caire P, 2013, S VIS LANG HUM CEN C, P115, DOI 10.1109/RE.2013.6636711
[7]  
DeMarco T, 1979, STRUCTURED ANAL SYST, DOI [10.1007/978-3-642-48354-7_9, DOI 10.1007/978]
[8]  
Diamantopoulou V., 2017, COMPUTER SECURITY
[9]   Toward a formal research framework for ontological analyses [J].
Gehlert, Andreas ;
Esswein, Werner .
ADVANCED ENGINEERING INFORMATICS, 2007, 21 (02) :119-131
[10]   Pictures, words, and sounds: From which format are we best able to reason? [J].
Goolkasian, P .
JOURNAL OF GENERAL PSYCHOLOGY, 2000, 127 (04) :439-459