Open Access iconOpen Access

ARTICLE

crossmark

Usability Evaluation Through Fuzzy AHP-TOPSIS Approach: Security Requirement Perspective

by Yoosef B. Abushark1, Asif Irshad Khan1,*, Fawaz Jaber Alsolami1, Abdulmohsen Almalawi1, Md Mottahir Alam2, Alka Agrawal3, Rajeev Kumar3,4, Raees Ahmad Khan3

1 Department of Computer Science, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, 21589, Saudi Arabia
2 Department of Electrical and Computer Engineering, Faculty of Engineering, King Abdulaziz University, Jeddah, 21589, Saudi Arabia
3 Department of Information Technology, Babasaheb Bhimrao Ambedkar University, Lucknow, 226025, India
4 Department of Computer Application, Shri Ramswaroop Memorial University, Barabanki, 225003, India

* Corresponding Author: Asif Irshad Khan. Email: email

Computers, Materials & Continua 2021, 68(1), 1203-1218. https://doi.org/10.32604/cmc.2021.016610

Abstract

Most of the security strategies today are primarily designed to provide security protection, rather than to solve one of the basic security issues related to adequate software product architecture. Several models, frameworks and methodologies have been introduced by the researchers for a secure and sustainable software development life cycle. Therefore it is important to assess the usability of the popular security requirements engineering (SRE) approaches. A significant factor in the management and handling of successful security requirements is the assessment of security requirements engineering method performance. This assessment will allow changes to the engineering process of security requirements. The consistency of security requirements depends heavily on the usability of security requirements engineering. Several SRE approaches are available for use and each approach takes into account several factors of usability but does not cover every element of usability. There seems to be no realistic implementation of such models because the concept of usability is not specific. This paper aims at specifying the different taxonomy of usability and design hierarchical usability model. The taxonomy takes into account the common quality assessment parameters that combine variables, attributes, and characteristics identified in different approaches used for security requirements engineering. The multiple-criteria decision-making (MCDM) model used in this paper for usability evaluation is called the fuzzy AHP-TOPSIS model which can conveniently be incorporated into the current approach of software engineering. Five significant usability criteria are identified and used to evaluate the six different alternatives. Such strategies are graded as per their expected values of usability.

Keywords


Cite This Article

APA Style
Abushark, Y.B., Khan, A.I., Alsolami, F.J., Almalawi, A., Alam, M.M. et al. (2021). Usability evaluation through fuzzy AHP-TOPSIS approach: security requirement perspective. Computers, Materials & Continua, 68(1), 1203-1218. https://doi.org/10.32604/cmc.2021.016610
Vancouver Style
Abushark YB, Khan AI, Alsolami FJ, Almalawi A, Alam MM, Agrawal A, et al. Usability evaluation through fuzzy AHP-TOPSIS approach: security requirement perspective. Comput Mater Contin. 2021;68(1):1203-1218 https://doi.org/10.32604/cmc.2021.016610
IEEE Style
Y. B. Abushark et al., “Usability Evaluation Through Fuzzy AHP-TOPSIS Approach: Security Requirement Perspective,” Comput. Mater. Contin., vol. 68, no. 1, pp. 1203-1218, 2021. https://doi.org/10.32604/cmc.2021.016610

Citations




cc Copyright © 2021 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 2816

    View

  • 1851

    Download

  • 0

    Like

Share Link