Open Access iconOpen Access

ARTICLE

crossmark

Multi-Level Hesitant Fuzzy Based Model for Usable-Security Assessment

Mohd Nadeem1, Jehad F. Al-Amri2, Ahmad F. Subahi3, Adil Hussain Seh1, Suhel Ahmad Khan4, Alka Agrawal1, Raees Ahmad Khan1,*

1 Department of Information Technology, Babasaheb Bhimrao Ambedkar University, Lucknow, 226025, India
2 Department of Information Technology, College of Computers and Information Technology, Taif University, Taif, 21944, Saudi Arabia
3 Department of Computer Science, University College of Al Jamoum, Umm Al Qura University, Makkah, 21421, Saudi Arabia
4 Department of Computer Science, Indira Gandhi National Tribal University, Amarkantak, 84886, India

* Corresponding Author: Raees Ahmad Khan. Email: email

Intelligent Automation & Soft Computing 2022, 31(1), 61-82. https://doi.org/10.32604/iasc.2022.019624

Abstract

Present day healthcare sector is frequently victimized by the intruders. Healthcare data industry has borne the brunt of the highest number of data breach episodes in the last few years. The key reason for this is attributed to the sensitivity of healthcare data and the high costs entailed in trading the data over the dark web. Hence, usable-security evaluation of healthcare information systems is the need of hour so as to identify the vulnerabilities and provide preventive measures as a shield against the breaches. Usable-security assessment will help the software designers and developers to prioritize usable-security attributes according to the customers’ needs and bridge the security gap. This study, in particular, evaluates the usable-security of Health Information Software Systems (HISS) in design tactics perspective by using Multi Criteria Decision Making (MCDM) problem solving techniques. Hesitant fuzzy based Analytical Hierarchy Process (AHP) and Technique for Order of Preference by Similarity to Ideal-Solutions (TOPSIS) methods have been applied to conduct the quantitative analysis of usable-security of software. Five attributes and 12 sub-attributes with 6 HISS alternatives of Indian hospitals have been considered in this work for usable-security assessment. To draw a priority list from the analysis, the results of the study show that the selected usable-security attributes attained the following ranking order: User-Error protection, Learnability, Data validation, Robustness, Revoke access, Intrusion detection, Authentication, Encryption, Limit access, Reliability, Efficiency, Audit trail respectively. Furthermore, HISS-1 alternative achieved the highest satisfaction degree followed by HISS-2 and HISS-4. HISS-6 got the lowest score in the context of providing ideal usable-security mechanism. The present research endeavour will be helpful for the software designers as the findings of the study will facilitate in developing secure and usable software products from the initial stages of the software development process itself.

Keywords


Cite This Article

APA Style
Nadeem, M., Al-Amri, J.F., Subahi, A.F., Seh, A.H., Khan, S.A. et al. (2022). Multi-level hesitant fuzzy based model for usable-security assessment. Intelligent Automation & Soft Computing, 31(1), 61-82. https://doi.org/10.32604/iasc.2022.019624
Vancouver Style
Nadeem M, Al-Amri JF, Subahi AF, Seh AH, Khan SA, Agrawal A, et al. Multi-level hesitant fuzzy based model for usable-security assessment. Intell Automat Soft Comput . 2022;31(1):61-82 https://doi.org/10.32604/iasc.2022.019624
IEEE Style
M. Nadeem et al., “Multi-Level Hesitant Fuzzy Based Model for Usable-Security Assessment,” Intell. Automat. Soft Comput. , vol. 31, no. 1, pp. 61-82, 2022. https://doi.org/10.32604/iasc.2022.019624



cc Copyright © 2022 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1914

    View

  • 1114

    Download

  • 0

    Like

Share Link