seceng-course-exp-2012
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
seceng-course-exp-2012 [2014/07/08 17:44] – [Results] martina.degramatica@unitn.it | seceng-course-exp-2012 [2021/01/29 10:58] (current) – external edit 127.0.0.1 | ||
---|---|---|---|
Line 3: | Line 3: | ||
An experiment by Katsyarina Labunets, Fabio Massacci, Federica Paci, Le Minh Sang Tran. | An experiment by Katsyarina Labunets, Fabio Massacci, Federica Paci, Le Minh Sang Tran. | ||
- | This page provides additional resources that enable replication of our work published at {{: | + | This page provides additional resources that enable replication of our work published at {{: |
===== Goals ===== | ===== Goals ===== | ||
The goal of the experiment was to evaluate and compare two types of risk-driven methods, namely, visual methods (CORAS) and textual methods (SREP) with respect to their // | The goal of the experiment was to evaluate and compare two types of risk-driven methods, namely, visual methods (CORAS) and textual methods (SREP) with respect to their // | ||
Line 32: | Line 32: | ||
===== Results ===== | ===== Results ===== | ||
- | * Methods' | + | * //Methods' |
- | Results show that visual method is more effective in identifying threats than textual method. This is confirmed if we consider the number of threats identified with visual and textual methods across the task assigned to the groups. | + | Results show that visual method is more effective in identifying threats than textual method. This is confirmed if we consider the //number of threats// identified with visual and textual methods across the task assigned to the groups. |
the visual one in identifying security requirements. | the visual one in identifying security requirements. | ||
- | * Methods' | + | * //Methods' |
- | * Qualitative | + | Participants’ //overall preference// |
+ | * //Qualitative | ||
+ | The different number of threats and security requirements identified can be likely explained by the differences between the two methods indicated by the participants during the interviews. //Diagrams in visual method help brainstorming on the threats//, giving an overview of the possible threats, the threat scenarios and the assets, while the identification of threats in textual method is not facilitated by the use of tables as it is more difficult to link assets and threats. As suggested by the participants then, the identification of threats in textual method could be made easier if a catalog of common threats was available. | ||
+ | On the other side, //textual method is slightly more effective in eliciting security requirements// | ||
===== Additional Material ===== | ===== Additional Material ===== | ||
* For additional information on the experimental design please see the {{: | * For additional information on the experimental design please see the {{: | ||
* For privacy reasons, at the beginning of the experiment a {{: | * For privacy reasons, at the beginning of the experiment a {{: | ||
* Participants' | * Participants' | ||
+ | * | ||
+ | |||
+ | |||
+ | **Data collected during the experiment are available upon request.** | ||
| |
seceng-course-exp-2012.1404834259.txt.gz · Last modified: (external edit)