Catalogue-based guideline for misuse case

Misuse case is one of the security requirement elicitation techniques that are easy to use and learn. Unfortunately, the current guideline provided is too general. The process of identifying the misuse case and threats is open for the analyst's interpretation. Lack of knowledge in security thre...

Full description

Bibliographic Details
Main Authors: Khairuddin, Muhammad Asyraf, Abd Ghani, Abdul Azim, Zulzalil, Hazura, Hassan, Saadah
Format: Article
Published: Little Lion Scientific 2022
Online Access:http://psasir.upm.edu.my/id/eprint/100635/
_version_ 1848863374961541120
author Khairuddin, Muhammad Asyraf
Abd Ghani, Abdul Azim
Zulzalil, Hazura
Hassan, Saadah
author_facet Khairuddin, Muhammad Asyraf
Abd Ghani, Abdul Azim
Zulzalil, Hazura
Hassan, Saadah
author_sort Khairuddin, Muhammad Asyraf
building UPM Institutional Repository
collection Online Access
description Misuse case is one of the security requirement elicitation techniques that are easy to use and learn. Unfortunately, the current guideline provided is too general. The process of identifying the misuse case and threats is open for the analyst's interpretation. Lack of knowledge in security threats also can make it worse. These problems can lead to analysis paralysis situation. In this paper, we proposed a catalogue-based guideline to support misuse case techniques to elicit security requirements. This guideline consists of two catalogues used to assist software developers in identifying attacks and threats from a misuse case diagram. We experimented with selected students to evaluate the effectiveness of the guideline in identifying threats and types of threats. We also evaluated the usability of the guideline by conducting experts reviews. Experiment's result shows sufficient evidence that using the misuse case with the proposed catalogue-based guideline is more effective in identifying threats and types of threats than using the misuse case without a guideline. Expert review's result also shows that the catalogue-based guideline is more usable in identifying threats than without using the guideline.
first_indexed 2025-11-15T13:31:55Z
format Article
id upm-100635
institution Universiti Putra Malaysia
institution_category Local University
last_indexed 2025-11-15T13:31:55Z
publishDate 2022
publisher Little Lion Scientific
recordtype eprints
repository_type Digital Repository
spelling upm-1006352023-09-21T06:58:46Z http://psasir.upm.edu.my/id/eprint/100635/ Catalogue-based guideline for misuse case Khairuddin, Muhammad Asyraf Abd Ghani, Abdul Azim Zulzalil, Hazura Hassan, Saadah Misuse case is one of the security requirement elicitation techniques that are easy to use and learn. Unfortunately, the current guideline provided is too general. The process of identifying the misuse case and threats is open for the analyst's interpretation. Lack of knowledge in security threats also can make it worse. These problems can lead to analysis paralysis situation. In this paper, we proposed a catalogue-based guideline to support misuse case techniques to elicit security requirements. This guideline consists of two catalogues used to assist software developers in identifying attacks and threats from a misuse case diagram. We experimented with selected students to evaluate the effectiveness of the guideline in identifying threats and types of threats. We also evaluated the usability of the guideline by conducting experts reviews. Experiment's result shows sufficient evidence that using the misuse case with the proposed catalogue-based guideline is more effective in identifying threats and types of threats than using the misuse case without a guideline. Expert review's result also shows that the catalogue-based guideline is more usable in identifying threats than without using the guideline. Little Lion Scientific 2022-01 Article PeerReviewed Khairuddin, Muhammad Asyraf and Abd Ghani, Abdul Azim and Zulzalil, Hazura and Hassan, Saadah (2022) Catalogue-based guideline for misuse case. Journal of Theoretical and Applied Information Technology, 100 (1). 38 - 51. ISSN 1992-8645; ESSN: 1817-3195 http://www.jatit.org/volumes/onehundred01.php
spellingShingle Khairuddin, Muhammad Asyraf
Abd Ghani, Abdul Azim
Zulzalil, Hazura
Hassan, Saadah
Catalogue-based guideline for misuse case
title Catalogue-based guideline for misuse case
title_full Catalogue-based guideline for misuse case
title_fullStr Catalogue-based guideline for misuse case
title_full_unstemmed Catalogue-based guideline for misuse case
title_short Catalogue-based guideline for misuse case
title_sort catalogue-based guideline for misuse case
url http://psasir.upm.edu.my/id/eprint/100635/
http://psasir.upm.edu.my/id/eprint/100635/