Vol.31, No.1, 2022, pp.61-82, doi:10.32604/iasc.2022.019624
Multi-Level Hesitant Fuzzy Based Model for Usable-Security Assessment
  • Mohd Nadeem1, Jehad F. Al-Amri2, Ahmad F. Subahi3, Adil Hussain Seh1, Suhel Ahmad Khan4, Alka Agrawal1, Raees Ahmad Khan1,*
1 Department of Information Technology, Babasaheb Bhimrao Ambedkar University, Lucknow, 226025, India
2 Department of Information Technology, College of Computers and Information Technology, Taif University, Taif, 21944, Saudi Arabia
3 Department of Computer Science, University College of Al Jamoum, Umm Al Qura University, Makkah, 21421, Saudi Arabia
4 Department of Computer Science, Indira Gandhi National Tribal University, Amarkantak, 84886, India
* Corresponding Author: Raees Ahmad Khan. Email:
Received 19 April 2021; Accepted 20 May 2021; Issue published 03 September 2021
Present day healthcare sector is frequently victimized by the intruders. Healthcare data industry has borne the brunt of the highest number of data breach episodes in the last few years. The key reason for this is attributed to the sensitivity of healthcare data and the high costs entailed in trading the data over the dark web. Hence, usable-security evaluation of healthcare information systems is the need of hour so as to identify the vulnerabilities and provide preventive measures as a shield against the breaches. Usable-security assessment will help the software designers and developers to prioritize usable-security attributes according to the customers’ needs and bridge the security gap. This study, in particular, evaluates the usable-security of Health Information Software Systems (HISS) in design tactics perspective by using Multi Criteria Decision Making (MCDM) problem solving techniques. Hesitant fuzzy based Analytical Hierarchy Process (AHP) and Technique for Order of Preference by Similarity to Ideal-Solutions (TOPSIS) methods have been applied to conduct the quantitative analysis of usable-security of software. Five attributes and 12 sub-attributes with 6 HISS alternatives of Indian hospitals have been considered in this work for usable-security assessment. To draw a priority list from the analysis, the results of the study show that the selected usable-security attributes attained the following ranking order: User-Error protection, Learnability, Data validation, Robustness, Revoke access, Intrusion detection, Authentication, Encryption, Limit access, Reliability, Efficiency, Audit trail respectively. Furthermore, HISS-1 alternative achieved the highest satisfaction degree followed by HISS-2 and HISS-4. HISS-6 got the lowest score in the context of providing ideal usable-security mechanism. The present research endeavour will be helpful for the software designers as the findings of the study will facilitate in developing secure and usable software products from the initial stages of the software development process itself.
Usable-security; development process; health information software systems; hesitant fuzzy based AHP-TOPSIS
Cite This Article
Nadeem, M., Al-Amri, J. F., Subahi, A. F., Seh, A. H., Khan, S. A. et al. (2022). Multi-Level Hesitant Fuzzy Based Model for Usable-Security Assessment. Intelligent Automation & Soft Computing, 31(1), 61–82.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.