| Literature DB >> 32948169 |
Md Tarique Jamal Ansari1, Fahad Ahmed Al-Zahrani2, Dhirendra Pandey3, Alka Agrawal3.
Abstract
BACKGROUND: Today's healthcare organizations want to implement secure and quality healthcare software as cyber-security is a significant risk factor for healthcare data. Considering security requirements during trustworthy healthcare software development process is an essential part of the quality software development. There are several Security Requirements Engineering (SRE) methodologies, framework, process, standards available today. Unfortunately, there is still a necessity to improve these security requirements engineering approaches. Determining the most suitable security requirements engineering method for trustworthy healthcare software development is a challenging process. This study is aimed to present security experts' perspective on the relative importance of the criteria for selecting effective SRE method by utilizing the multi-criteria decision making methods.Entities:
Keywords: Fuzzy TOPSIS; Healthcare application; Quality software development; Risk analysis; Security requirements; Software security
Year: 2020 PMID: 32948169 PMCID: PMC7502023 DOI: 10.1186/s12911-020-01209-8
Source DB: PubMed Journal: BMC Med Inform Decis Mak ISSN: 1472-6947 Impact factor: 2.796
Fig. 1Year-wise healthcare data breaches (Source: HIPAA Journal)
Fig. 2Security requirements engineering for trustworthy healthcare system
Fig. 3Hierarchical model of criteria and alternatives
The ISO 27005 standard criteria for effective SRE approach selection
| Criteria | Description |
|---|---|
| Security goal (C1) | Security goals clearly state what the software system must avoid and not how that preventative measures should be accomplished. |
| Security requirement (C2) | Security requirements are implications of software system threats that can be obtained only from design process. Security requirements quite precisely reflect safety objectives. |
| Stakeholder (C3) | A stakeholder is a person, an organization or a community with an interest with the under development software system. A Stakeholder perspective defines a specific stakeholder’s requirements. The stakeholders can show various kinds of requirements. |
| Asset (C4) | Software asset would be any process / service that a corporation uses as part of the economic operations. For companies, monitoring and managing such assets is essential, as they may involve regulatory risks, threats to brand equity and even existence. |
| Threat (C5) | Threats to software system are harmful elements of computer programs and programs that can potentially harm your computer or capture personal and financial information. |
| Vulnerability (C6) | Vulnerability may consider as software system defect that can consider leaving it open to manipulation. Vulnerability may also correspond to any kind of deficiency in a software system on its own, in a set of processes, or even anything which leaves the security and privacy of data at risk. |
| Risk (C7) | Risk is a failure prediction; a possible issue that might or might not arise in the future. It is usually limited by inadequate of information, regulation or time. It is possibility of experiencing from failure in software development life cycle. |
Fig. 4Flowchart of the fuzzy TOPSIS process
Characteristics of Criteria
| Criteria | Type | Weight | |
|---|---|---|---|
| 1 | C1 | + | 0.143,0.143,0.143 |
| 2 | C2 | + | 0.143,0.143,0.143 |
| 3 | C3 | + | 0.143,0.143,0.143 |
| 4 | C4 | + | 0.143,0.143,0.143 |
| 5 | C5 | + | 0.143,0.143,0.143 |
| 6 | C6 | + | 0.143,0.143,0.143 |
| 7 | C7 | + | 0.143,0.143,0.143 |
Fuzzy Scale
| Code | Linguistic terms | L | M | U |
|---|---|---|---|---|
| 1 | Very low | 0 | 0 | 1 |
| 2 | Low | 0 | 1 | 3 |
| 3 | Moderately low | 1 | 3 | 5 |
| 4 | Moderate | 3 | 5 | 7 |
| 5 | Moderately high | 5 | 7 | 9 |
| 6 | High | 7 | 9 | 10 |
| 7 | Very high | 9 | 10 | 10 |
Decision matrix
| C1 | C2 | C3 | C4 | C5 | C6 | C7 | |
|---|---|---|---|---|---|---|---|
| A1 | 3.480,5.480,7.440 | 4.680,6.680,8.520 | 5.080,7.000,8.520 | 4.920,6.880,8.560 | 5.080,7.000,8.480 | 5.800,7.680,9.120 | 5.240,7.160,8.720 |
| A2 | 4.760,6.760,8.560 | 5.320,7.280,8.880 | 4.680,6.680,8.480 | 5.560,7.560,9.080 | 5.560,7.440,8.840 | 5.160,7.040,8.560 | 5.000,7.000,8.600 |
| A3 | 4.840,6.800,8.480 | 5.480,7.440,9.000 | 5.320,7.280,8.920 | 5.480,7.400,8.920 | 5.400,7.280,8.840 | 5.120,7.000,8.520 | 5.240,7.160,8.800 |
| A4 | 4.600,6.600,8.320 | 5.160,7.080,8.640 | 4.760,6.720,8.400 | 4.680,6.640,8.360 | 4.920,6.800,8.440 | 4.680,6.680,8.480 | 4.520,6.520,8.240 |
| A5 | 4.680,6.680,8.520 | 5.000,6.960,8.560 | 5.160,7.120,8.760 | 4.840,6.800,8.520 | 4.680,6.680,8.480 | 4.520,6.520,8.320 | 4.360,6.360,8.200 |
A normalized decision matrix
| C1 | C2 | C3 | C4 | C5 | C6 | C7 | |
|---|---|---|---|---|---|---|---|
| A1 | 0.407,0.640,0.869 | 0.520,0.742,0.947 | 0.570,0.785,0.955 | 0.542,0.758,0.943 | 0.575,0.792,0.959 | 0.636,0.842,1.000 | 0.595,0.814,0.991 |
| A2 | 0.556,0.790,1.000 | 0.591,0.809,0.987 | 0.525,0.749,0.951 | 0.612,0.833,1.000 | 0.629,0.842,1.000 | 0.566,0.772,0.939 | 0.568,0.795,0.977 |
| A3 | 0.565,0.794,0.991 | 0.609,0.827,1.000 | 0.596,0.816,1.000 | 0.604,0.815,0.982 | 0.611,0.824,1.000 | 0.561,0.768,0.934 | 0.595,0.814,1.000 |
| A4 | 0.537,0.771,0.972 | 0.573,0.787,0.960 | 0.534,0.753,0.942 | 0.515,0.731,0.921 | 0.557,0.769,0.955 | 0.513,0.732,0.930 | 0.514,0.741,0.936 |
| A5 | 0.547,0.780,0.995 | 0.556,0.773,0.951 | 0.578,0.798,0.982 | 0.533,0.749,0.938 | 0.529,0.756,0.959 | 0.496,0.715,0.912 | 0.495,0.723,0.932 |
The weighted normalized decision matrix
| C1 | C2 | C3 | C4 | C5 | C6 | C7 | |
|---|---|---|---|---|---|---|---|
| A1 | 0.058,0.092,0.124 | 0.074,0.106,0.135 | 0.081,0.112,0.137 | 0.077,0.108,0.135 | 0.082,0.113,0.137 | 0.091,0.120,0.143 | 0.085,0.116,0.142 |
| A2 | 0.080,0.113,0.143 | 0.085,0.116,0.141 | 0.075,0.107,0.136 | 0.088,0.119,0.143 | 0.090,0.120,0.143 | 0.081,0.110,0.134 | 0.081,0.114,0.140 |
| A3 | 0.081,0.114,0.142 | 0.087,0.118,0.143 | 0.085,0.117,0.143 | 0.086,0.117,0.140 | 0.087,0.118,0.143 | 0.080,0.110,0.134 | 0.085,0.116,0.143 |
| A4 | 0.077,0.110,0.139 | 0.082,0.112,0.137 | 0.076,0.108,0.135 | 0.074,0.105,0.132 | 0.080,0.110,0.137 | 0.073,0.105,0.133 | 0.073,0.106,0.134 |
| A5 | 0.078,0.112,0.142 | 0.079,0.111,0.136 | 0.083,0.114,0.140 | 0.076,0.107,0.134 | 0.076,0.108,0.137 | 0.071,0.102,0.130 | 0.071,0.103,0.133 |
The positive and negative ideal solutions
| Positive ideal | Negative ideal | |
|---|---|---|
| C1 | 0.081,0.114,0.143 | 0.058,0.092,0.124 |
| C2 | 0.087,0.118,0.143 | 0.074,0.106,0.135 |
| C3 | 0.085,0.117,0.143 | 0.075,0.107,0.135 |
| C4 | 0.088,0.119,0.143 | 0.074,0.105,0.132 |
| C5 | 0.090,0.120,0.143 | 0.076,0.108,0.137 |
| C6 | 0.091,0.120,0.143 | 0.071,0.102,0.130 |
| C7 | 0.085,0.116,0.143 | 0.071,0.103,0.133 |
Distance from positive and negative ideal solutions
| Distance from positive ideal | Distance from negative ideal | |
|---|---|---|
| A1 | 0.055 | 0.043 |
| A2 | 0.025 | 0.072 |
| A3 | 0.015 | 0.082 |
| A4 | 0.066 | 0.031 |
| A5 | 0.064 | 0.033 |
Closeness coefficient
| Ci | Rank | |
|---|---|---|
| A1 | 0.438 | 3 |
| A2 | 0.74 | 2 |
| A3 | 0.842 | 1 |
| A4 | 0.322 | 5 |
| A5 | 0.341 | 4 |
Fig. 5Closeness coefficient graph