Skip to main content

Diagraming Approach to Structure the Security Lessons: Evaluation Using Cognitive Dimensions

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8564))

Abstract

Currently, the lessons learned from the security incidents are documented in add-hoc means such as lengthy security reports, free-style textual news letters, emails or informal meetings. This makes it difficult to effectively communicate security lessons among peers and organisations. The diagraming approach such as the Generic Security Template (G.S.T.) has been proposed to address this problem. This paper extends the work by evaluating its usability using the Cognitive Dimensions and identifies some aspects that need to be improved.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Porteous, T., Bond, C., Robertson, R., Hannaford, P., Reiter, E.: Electronic transfer of prescription-related information: comparing views of patients, general practitioners, and pharmacists. The British Journal of General Practice 53(488), 204 (2003)

    Google Scholar 

  2. He, Y., Johnson, C.: An empirical study on the use of the generic security template for structuring the lessons from information security incidents. In: The 6th International Conference of Computer Science and Information Technology (2014)

    Google Scholar 

  3. He, Y., Johnson, C.: An empirical study on the use of the generic security template for structuring the lessons from information security incidents. In: The 8th IFIP WG 11.11 International Conference on Trust Management (2014)

    Google Scholar 

  4. He, Y., Johnson, C., Lu, Y., Lin, Y.: Improving the information security management: An industrial study in the privacy of electronic patient records. In: The 27th International Symposium on Computer-Based Medical Systems (2014)

    Google Scholar 

  5. Green, T.R.G., Petre, M.: Usability analysis of visual programming environments: a‘cognitive dimensions’ framework. Journal of Visual Languages & Computing 7(2), 131–174 (1996)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

He, Y., Johnson, C., Evangelopoulou, M., Lin, ZS. (2014). Diagraming Approach to Structure the Security Lessons: Evaluation Using Cognitive Dimensions. In: Holz, T., Ioannidis, S. (eds) Trust and Trustworthy Computing. Trust 2014. Lecture Notes in Computer Science, vol 8564. Springer, Cham. https://doi.org/10.1007/978-3-319-08593-7_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-08593-7_19

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-08592-0

  • Online ISBN: 978-3-319-08593-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics