“…From equations (13)(14), calculating the fuzzy weights of characteristics as follows: r 1 = [(1.00, 1.00, 1.00, 1.00) ⊗ (1.00, 1.00, 3.00, 5.00)] 1/2 = [(1.0000 X 1.0000)1/2, (1.0000 X 1.0000)1/2, (1.0000 X 3.0000)1/2, (1.0000 X 5.0000)1/2] = (1.000, 1.000, 1.414, 2.236) r 2 = [(0.20, 0.33, 1.00, 1.00) ⊗ (1.00, 1.00, 1.00, 1.00)] 1/2 = [(0.2000 X 1.0000)1/2, (0.3300 X 1.0000)1/2, (1.0000 X 1.0000)1/2, (1.0000 X 5.0000)1/2] = (0.4472, 0.5745, 1.0000, 1.0000) Now, the weight of respective characteristic can be evaluated through equations (14) as follows: Authors determined the effect of usable-security in various alternatives after obtaining the final or dependent weights of usable-security characteristics. In this study, eight successive projects were taken to test the usable-security of two different software.…”