Muhammad Asyraf, Khairuddin and Abdul Azim, Abd Ghani and Hazura, Zulzalil and Sa’adah, Hassan (2022) CATALOGUE-BASED GUIDELINE FOR MISUSE CASE. Journal of Theoretical and Applied Information Technology, 100 (1). pp. 38-51. ISSN 1992-8645

[img] PDF

Download (951kB)
Official URL:


Misuse case is one of the security requirement elicitation techniques that are easy to use and learn. Unfortunately, the current guideline provided is too general. The process of identifying the misuse case and threats is open for the analyst's interpretation. Lack of knowledge in security threats also can make it worse. These problems can lead to analysis paralysis situation. In this paper, we proposed a catalogue-based guideline to support misuse case techniques to elicit security requirements. This guideline consists of two catalogues used to assist software developers in identifying attacks and threats from a misuse case diagram. We experimented with selected students to evaluate the effectiveness of the guideline in identifying threats and types of threats. We also evaluated the usability of the guideline by conducting experts reviews. Experiment's result shows sufficient evidence that using the misuse case with the proposed catalogue-based guideline is more effective in identifying threats and types of threats than using the misuse case without a guideline. Expert review's result also shows that the catalogue-based guideline is more usable in identifying threats than without using the guideline.

Item Type: Article
Uncontrolled Keywords: Misuse Case, Security Requirements, Threats, Catalogue, Guideline
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Divisions: Academic Faculties, Institutes and Centres > Faculty of Computer Science and Information Technology
Depositing User: Tuah
Date Deposited: 28 Jan 2022 08:55
Last Modified: 28 Jan 2022 08:55

Actions (For repository members only: login required)

View Item View Item