Evaluation of the risk and security overlay of archimate to model information system security risks

Nicolas Mayer, C. Feltus
{"title":"Evaluation of the risk and security overlay of archimate to model information system security risks","authors":"Nicolas Mayer, C. Feltus","doi":"10.1109/EDOCW.2017.30","DOIUrl":null,"url":null,"abstract":"We evaluated the support proposed by the RSO to represent graphically our EAM-ISSRM (Enterprise Architecture Management - Information System Security Risk Management) integrated model. The evaluation of the RSO visual notation has been done at two different levels: completeness with regards to the EAM-ISSRM integrated model (Section III) and cognitive effectiveness, relying on the nine principles established by D. Moody [\"The 'Physics' of Notations: Toward a Scientific Basis for Constructing Visual Notations in Software Engineering,\" IEEE Trans. Softw. Eng., vol. 35, no. 6, pp. 756-779, Nov. 2009] (Section IV). Regarding completeness, the coverage of the EAMISSRM integrated model by the RSO is complete apart from 'Event'. As discussed in Section III, this lack is negligible and we can consider the RSO as an appropriate notation to support the EAM-ISSRM integrated model from a completeness point of view. Regarding cognitive effectiveness, many gaps have been identified with regards to the nine principle established by Moody. Although no quantitative analysis has been performed to objectify this conclusion, the RSO can decently not be considered as an appropriate notation from a cognitive effectiveness point of view and there is room to propose a notation better on this aspect. This paper is focused on assessing the RSO without suggesting improvements based on the conclusions drawn. As a consequence, our objective for future work is to propose a more cognitive effective visual notation for the EAM-ISSRM integrated model. The approach currently considered is to operationalize Moody's principles into concrete metrics and requirements, taking into account the needs and profile of the target group of our notation (information security risk managers) through personas development and user experience map. With such an approach, we will be able to make decisions on the necessary trade-offs about our visual syntax, taking care of a specific context. We also aim at validating our proposal(s) with the help of tools and approaches extracted from cognitive psychology research applied to HCI domain (e.g., eye tracking, heuristic evaluation, user experience evaluation…).","PeriodicalId":315067,"journal":{"name":"2017 IEEE 21st International Enterprise Distributed Object Computing Workshop (EDOCW)","volume":"344 ","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"21","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 IEEE 21st International Enterprise Distributed Object Computing Workshop (EDOCW)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EDOCW.2017.30","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 21

Abstract

We evaluated the support proposed by the RSO to represent graphically our EAM-ISSRM (Enterprise Architecture Management - Information System Security Risk Management) integrated model. The evaluation of the RSO visual notation has been done at two different levels: completeness with regards to the EAM-ISSRM integrated model (Section III) and cognitive effectiveness, relying on the nine principles established by D. Moody ["The 'Physics' of Notations: Toward a Scientific Basis for Constructing Visual Notations in Software Engineering," IEEE Trans. Softw. Eng., vol. 35, no. 6, pp. 756-779, Nov. 2009] (Section IV). Regarding completeness, the coverage of the EAMISSRM integrated model by the RSO is complete apart from 'Event'. As discussed in Section III, this lack is negligible and we can consider the RSO as an appropriate notation to support the EAM-ISSRM integrated model from a completeness point of view. Regarding cognitive effectiveness, many gaps have been identified with regards to the nine principle established by Moody. Although no quantitative analysis has been performed to objectify this conclusion, the RSO can decently not be considered as an appropriate notation from a cognitive effectiveness point of view and there is room to propose a notation better on this aspect. This paper is focused on assessing the RSO without suggesting improvements based on the conclusions drawn. As a consequence, our objective for future work is to propose a more cognitive effective visual notation for the EAM-ISSRM integrated model. The approach currently considered is to operationalize Moody's principles into concrete metrics and requirements, taking into account the needs and profile of the target group of our notation (information security risk managers) through personas development and user experience map. With such an approach, we will be able to make decisions on the necessary trade-offs about our visual syntax, taking care of a specific context. We also aim at validating our proposal(s) with the help of tools and approaches extracted from cognitive psychology research applied to HCI domain (e.g., eye tracking, heuristic evaluation, user experience evaluation…).
利用地图的风险评估和安全叠加来建模信息系统的安全风险
我们评估了RSO提出的支持,以图形化的方式表示我们的EAM-ISSRM(企业架构管理-信息系统安全风险管理)集成模型。RSO可视化符号的评估已经在两个不同的层面上完成:关于EAM-ISSRM集成模型的完整性(第三部分)和认知有效性,依赖于D. Moody[“符号的“物理学”:在软件工程中构建可视化符号的科学基础”,IEEE翻译]建立的九个原则。Softw。Eng。,第35卷,第35期。关于完整性,除了“Event”之外,RSO对EAMISSRM集成模型的覆盖是完整的。正如第三节所讨论的,这种缺失是可以忽略不计的,从完整性的角度来看,我们可以将RSO视为支持EAM-ISSRM集成模型的适当符号。在认知有效性方面,穆迪建立的九项原则存在许多空白。虽然没有进行定量分析来客观化这一结论,但从认知有效性的角度来看,RSO不能被认为是一种适当的符号,而且在这方面还有空间提出更好的符号。本文的重点是评估RSO,而不是根据得出的结论提出改进建议。因此,我们未来工作的目标是为EAM-ISSRM集成模型提出一种更认知有效的视觉符号。目前考虑的方法是通过角色开发和用户体验图,考虑到我们符号的目标群体(信息安全风险管理人员)的需求和概况,将穆迪的原则操作化为具体的度量和要求。有了这样的方法,我们就能够对视觉语法做出必要的权衡,照顾到特定的上下文。我们还旨在通过从应用于HCI领域的认知心理学研究中提取的工具和方法来验证我们的建议(例如,眼动追踪,启发式评估,用户体验评估……)。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信