2017
DOI: 10.1007/978-3-319-54045-0_15
|View full text |Cite
|
Sign up to set email alerts
|

On the Equivalence Between Graphical and Tabular Representations for Security Risk Assessment

Abstract: Abstract.[Context] Many security risk assessment methods are proposed both in academia (typically with a graphical notation) and industry (typically with a tabular notation).[Question] We compare methods based on those two notations with respect to their actual and perceived efficacy when both groups are equipped with a domain-specific security catalogue (as typically available in industry risk assessments).[Results] Two controlled experiments with MSc students in computer science show that tabular and graphic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
4
1

Relationship

2
8

Authors

Journals

citations
Cited by 15 publications
(6 citation statements)
references
References 29 publications
0
6
0
Order By: Relevance
“…In their original study, Labunets et al [20], compared two risk assessment methods, a visual and a textual method and reported that the visual method was more effective for identifying threats than the textual one. The same study was replicated in [19], applying similar procedures. In contrast to the original study, the replication reported that the two methods being investigated were (statistically) equivalent with regards to the quality of identified threats and security controls.…”
Section: Related Workmentioning
confidence: 99%
“…In their original study, Labunets et al [20], compared two risk assessment methods, a visual and a textual method and reported that the visual method was more effective for identifying threats than the textual one. The same study was replicated in [19], applying similar procedures. In contrast to the original study, the replication reported that the two methods being investigated were (statistically) equivalent with regards to the quality of identified threats and security controls.…”
Section: Related Workmentioning
confidence: 99%
“…Labunets et al [25] conducted a controlled experiment that was replicated in [24] using student participants to compare two risk assessment methods, a visual method (CORAS) and a textual method (SREP). The first study found that the visual method was more effective for identifying threats than the textual one.…”
Section: Replicationsmentioning
confidence: 99%
“…The last one contains empirical studies comparing graphical and textual representations for, e.g., business processes [36], software architectures [17], safety and system requirements [9, 42, 44ś46]. Recently, there were published a few empirical studies examining representations for security risks [15,19,25,50] or comparing graphical and tabular methods for security risk assessment in full scale application [22,24,27,30].…”
Section: Related Workmentioning
confidence: 99%