iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://doi.org/10.1007/978-3-540-87875-9_50
Safety Hazard Identification by Misuse Cases: Experimental Comparison of Text and Diagrams | SpringerLink
Skip to main content

Safety Hazard Identification by Misuse Cases: Experimental Comparison of Text and Diagrams

  • Conference paper
Model Driven Engineering Languages and Systems (MODELS 2008)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 5301))

Abstract

In general, diagrams and text are both considered to have their advantages and disadvantages for the representation of use case models, but this is rarely investigated experimentally. This paper describes a controlled experiment where we compare safety hazard identification by means of misuse cases based on use case diagrams and textual use cases. The experiment participants found use case diagrams and textual use cases equally easy to use. In most cases those who used textual use cases were able to identify more failure modes or threats. The main reason for this seems to be that use cases encourage analysts to specifically focus on threats related to the functions mentioned in the use case, and textual use cases include more functional details than diagrams. The focus is decided by information in each use case which will thus decide the number of threats identified.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Firesmith, D.G.: Engineering Safety Requirements, Safety Constraints, and Safety-Critical Requirements. Journal of Object Technology, 3, 27–42 (2004)

    Google Scholar 

  2. McDermott, J., Fox, C.: Using Abuse Case Models for Security Requirements Analysis. In: 15th Annual Computer Security Applications Conference (ACSAC 1999). IEEE Computer Soceity Press, Los Alamitos (1999)

    Google Scholar 

  3. Leveson, N.G.: Safeware: System Safety and Computers. Addison-Wesley, Boston (1995)

    Google Scholar 

  4. Lutz, R.R.: Software Engineering for Safety: A Roadmap. In: Finkelstein, A. (ed.) The Future of Software Engineering, pp. 213–226. ACM Press, New York (2000)

    Google Scholar 

  5. Sindre, G., Opdahl, A.L.: Eliciting Security Requirements with Misuse Cases. Requirements Engineering 10, 34–44 (2005)

    Article  Google Scholar 

  6. Alexander, I.F.: Initial Industrial Experience of Misuse Cases in Trade-Off Analysis. In: Pohl, K. (ed.) 10th Anniversary IEEE Joint International Requirements Engineering Conference (RE 2002), Essen, Germany, 9-13 September. IEEE, Los Alamitos (2002)

    Google Scholar 

  7. Alexander, I.F.: Misuse Cases, Use Cases with Hostile Intent. IEEE Software 20, 58–66 (2003)

    Article  Google Scholar 

  8. Sindre, G.: A look at misuse cases for safety concerns. In: ME 2007, Geneva, Switzerland. IFIP. Springer, Heidelberg (2007)

    Google Scholar 

  9. Stålhane, T., Sindre, G.: A comparison of two approaches to safety analysis based on use cases. In: ER 2007, Auckland, New Zealand. LNCS. Springer, Heidelberg (2007)

    Google Scholar 

  10. Stamatis, D.H.: Failure Mode and Effect Analysis: FMEA from theory to execution. American Society fbor Quality (ASQ), Milwaukee, Wisconsin (1995)

    Google Scholar 

  11. Achour-Salinesi, C.B., Rolland, C., Maiden, N.A.M., Souveyet, C.: Guiding Use Case Authoring: Results from an Empirical Study. In: 4th International Symposium on Requirements Engineering (RE 1999), 7-11 June, pp. 36–43. IEEE, Los Alamitos (1999)

    Google Scholar 

  12. Cox, K., Phalp, K.: Replicating the CREWS Use Case Authoring Guidelines Experiment. Empirical Software Engineering 5, 245–267 (2000)

    Article  MATH  Google Scholar 

  13. Anda, B., Sjøberg, D.I.K., Jørgensen, M.: Quality and Understandability of Use Case Models. In: Knudsen, J.L. (ed.) ECOOP 2001. LNCS, vol. 2072, pp. 402–428. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  14. Anda, B., Sjøberg, D.I.K.: Investigating the Role of Use Cases in the Construction of Class Diagrams. Empirical Software Engineering 10, 285–309 (2005)

    Article  Google Scholar 

  15. Thelin, T., Runeson, P., Regnell, B.: Usage-based reading: an experiment to guide reviewers with use cases. Information & Software Technology 43, 925–938 (2001)

    Article  Google Scholar 

  16. Cox, K., Aurum, A., Jeffery, D.R.: An Experiment in Inspecting the Quality of Use Case Descriptions. Journal of Research and Practice in Information Technology 36, 211–229 (2004)

    Google Scholar 

  17. Bernardez, B., Genero, M., Duran, A., Toro, M.: A Controlled Experiment for Evaluating a Metric-Based Reading Technique for Requirements Inspection. In: 10th International Symposium on Software Metrics (METRICS 2004), 11-17 September, pp. 257–268. IEEE, Los Alamitos (2004)

    Chapter  Google Scholar 

  18. Batra, D., Hoffer, J.A., Bostrom, R.P.: Comparing Representations with Relational and EER Models. Communications of the ACM 33, 126–139 (1990)

    Article  Google Scholar 

  19. Cheng, P.C.-H.: Why Diagrams Are (Sometimes) Six Times Easier than Words: Benefits beyond Locational Indexing. In: Blackwell, A.F., Marriott, K., Shimojima, A. (eds.) Diagrams 2004. LNCS (LNAI), vol. 2980, pp. 242–254. Springer, Heidelberg (2004)

    Google Scholar 

  20. Larkin, J.H., Simon, H.A.: Why a Diagram is (Sometimes) Worth Ten Thousand Words. Cognitive Science 11 (1987)

    Google Scholar 

  21. Boekelder, A., Steehouder, M.: Selecting and Switching: Some Advantages of Diagrams over Tables and Lists for Presenting Instructions. IEEE Transactions on Professional Communication 41, 229–241 (1998)

    Article  Google Scholar 

  22. Allmendinger, L.: Diagrams and Design Tools in Context. ACM SIGDOC Asterisk Journal of Computer Documentation 18, 25–41 (1994)

    Article  Google Scholar 

  23. Coll, R.A., Coll, J.H., Thakur, G.: Graphs and tables: a four factor experiment. Communications of the ACM 37, 77–84 (1994)

    Article  Google Scholar 

  24. Jacobson, I., Christerson, M., Jonsson, P., Overgaard, G.: Object-Oriented Software Engineering: A Use Case Driven Approach. Addison-Wesley, Boston (1992)

    MATH  Google Scholar 

  25. Cockburn, A.: Writing Effective Use Cases. Addison-Wesley, Boston (2001)

    Google Scholar 

  26. Wirfs-Brock, R.: Designing Scenarios: Making the Case for a Use Case Framework. The Smalltalk Report, vol. 3 (1993)

    Google Scholar 

  27. Bertin, J.: Semiology of Graphics: Diagrams, Networks, Maps. University of Wisconsin Press, Madison (1983)

    Google Scholar 

  28. Cheng, P.C.-H., Simon, H.A.: Scientific Discovery and Creative Reasoning with Diagrams. In: Smith, S., et al. (eds.) The Creative Cognition Approach, pp. 205–228. MIT Press, Cambridge (1995)

    Google Scholar 

  29. Davis, F.D., Bagozzi, R.P., Warshaw, P.R.: User Acceptance of Computer Technology: A Comparison of Two Theoretical Models. Management Science 35, 982–1003 (1989)

    Article  Google Scholar 

  30. Tukey, J.W.: Data analysis and behavioral science or learning to bear the quantitative’s man burden by shunning badmandments. In: Jones, L.W. (ed.) The Collected Works of John W. Tukey, Wadsworth, Monterey, CA, vol. III, pp. 187–389 (1986)

    Google Scholar 

  31. Heldal, R.: Use cases are more than System Operations. In: 2nd International Workshop on Use Case Modelling (WUsCaM-2005), Montego Bay, Jamaica, October 2-7 (2005)

    Google Scholar 

  32. Wohlin, C., Runeson, P., Höst, M., Ohlsson, M.C., Regnell, B., Wesslén, A.: Experimentation in Software Engineering: An Introduction. Kluwer Academic, Norwell (2000)

    MATH  Google Scholar 

  33. Runeson, P.: Using Students as Experiment Subjects – An Analysis on Graduate and Freshmen Student Data. In: Linkman, S. (ed.) 7th International Conference on Empirical Assessment & Evaluation in Software Engineering (EASE 2003), Keele University, Staffordshire, UK, 8-10 April, pp. 95–102 (2003)

    Google Scholar 

  34. Arisholm, E., Sjøberg, D.I.K.: Evaluating the Effect of a Delegated versus Centralized Control Style on the Maintainability of Object-oriented Software. IEEE Transactions on Software Engineering 30, 521–534 (2004)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Krzysztof Czarnecki Ileana Ober Jean-Michel Bruel Axel Uhl Markus Völter

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Stålhane, T., Sindre, G. (2008). Safety Hazard Identification by Misuse Cases: Experimental Comparison of Text and Diagrams. In: Czarnecki, K., Ober, I., Bruel, JM., Uhl, A., Völter, M. (eds) Model Driven Engineering Languages and Systems. MODELS 2008. Lecture Notes in Computer Science, vol 5301. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-87875-9_50

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-87875-9_50

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-87874-2

  • Online ISBN: 978-3-540-87875-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics