作者: Katsiaryna Labunets , Flavio Moreira de Oliveira , Sabrina Marczak , Federica Paci , Fabio Massacci
DOI:
关键词:
摘要: Context: Tabular and graphical representations are used to communicate security risk assessments for IT systems. However, there is no consensus on which type of representation better supports the comprehension risks (such as relationships between threats, vulnerabilities controls). Vessey's cognitive fit theory predicts that graphs should be because they capture spatial relationships. Method: We report results two studies performed in countries with 69 83 participants respectively, we assessed effectiveness tabular concerning extraction correct information about risks. Results: Participants who applied models gave more precise complete answers questions when requested find simple complex vulnerabilities, or other elements models. Conclusions: Our findings can explained by implicitly elementary linear Interest ICSE: It almost taken granted Software Engineering graphical-, diagram-based "the" way go (e.g., SE Body Knowledge). This paper provides some experimental-based doubts this might not always case. will provide an interesting debate ripple traditional requirements design notations outside security.