- Open Access
Improving the exchange of lessons learned in security incident reports: case studies in the privacy of electronic patient records
© He et al.; licensee Springer. 2015
Received: 20 December 2014
Accepted: 1 April 2015
Published: 7 May 2015
The increasing use of Electronic Health Records has been mirrored by a similar rise in the number of security incidents where confidential information has inadvertently been disclosed to third parties. These problems have been compounded by an apparent inability to learn from previous violations; similar security incidents have been observed across Europe, North America and Asia. This has resulted in the loss of confidence and trust of the public towards the organisations’ ability to protect the patients’ private information. The Generic Security Template (G.S.T.) has been proposed to communicate security lessons learned from previous security incidents. This paper conducts a series of empirical studies to evaluate the usability of the G.S.T. The first study compares the G.S.T. with the conventional text-based security incident reports. The two methods were compared in term of the users’ ability to identify a number of lessons learned from investigations into previous incidents involving the disclosure of healthcare records. The study showed that the graphical approach resulted in higher accuracy in terms of number of correct answers generated by participants. However, subjective feedback raised further questions about the usability of the G.S.T. as the readers of security incident reports try to interpret the lessons that can increase the security of patient data. The second study further evaluates the usability of the G.S.T. using the Cognitive Dimensions and identifies some aspects that need to be improved.
According to Symantec, the healthcare accounted for 36% in the total number of attacks on electronic information systems in 2013 . At 44% in 2014, healthcare continues to be the sector responsible for the largest percentage of disclosed data incidents by industry . Almost identical breaches have occurred across Europe, North America and Asia . Such incidents may affect the organisations’ reputation and challenge the public confidence and trust toward organisations’ information security management . It is imperative for the organisations to learn from those incidents and take effective actions to improve the reliability and trustworthiness of their information security management systems. Learning from incidents enables the organisation to extract meaningful information from incidents, and use this information to improve security management systems . Effective communication mechanism is needed to synthesis the information from the incident into the security incident management system so as to prevent a similar incident.
Popular communication mechanisms include formal reports, less formal meetings, newsletters, emails, as well as presentations to management . However, the detailed incident reports that are produced in the post-incident activity  have not been given enough attention. Those reports contain comprehensive information, which is typically classified into two types, business impact and remediation information . Business impact information involves how the incident is affecting the organisation in terms of mission impact, financial impact, etc. For example, “The missing external hard drive is believed to contain numerous research-related files containing personally identifiable information and/or individually identifiable health information for over 250,000 veterans, and information obtained from the Centres for Medicare & Medicaid Services (CMS), Department of Health and Human Services (HHS), on over 1.3 million medical providers” . Remediation information mainly refers to the suggested remediation actions, plans, procedures, and lessons learned. For example, “We recommend that the Assistant Secretary for Information and Technology revise VA Directive 6601 to require the use of encryption, or an otherwise effective tool, to properly protect personally identifiable information and other sensitive data stored on removable storage devices when used within VA”. .
As for a purpose of sharing, it is suggested to avoid sharing business impact information with outside organisations unless there is a clear value proposition or formal reporting requirements. When sharing information with peers and partner organisations, incident response teams should focus on exchanging remediation information . The remediation information reported describes (1) the security issues, e.g. “The position sensitivity level for the IT Specialist was inaccurately designated as moderate risk, which was inconsistent with his programmer privileges and resulted in a less extensive background investigation”, (2) the security objectives violated during this process, e.g. “Position Sensitivity Level Assessments were Not Adequately Performed”, and (3) the recommendations, e.g. “We recommend that the Under Secretary for Health direct the Medical Centre Director to re-evaluate and correct position sensitivity levels and associated background investigations for positions at the Birmingham VAMC” . Those granular information are inter-related, however, they are scattered documented in a pure textual based report that makes it difficult for the readers to identify the relationships among them. This issue has been compounded by the lengthy security incident report, which is usually around hundred of pages . The stakeholders responsible for protecting patient data lack the time and the motivation to spend the many hours needed to read and digest existing reports. This creates significant problems within the wider scope of security management systems. It can be difficult to accurately assess the likelihood or consequences of future attacks when managers are unaware of previous incidents, which undermines the trustworthiness of the systems.
Previous work has shown that the G.S.T. can be used to map common lessons from data breaches in healthcare organisations in both the United States and in China . Although these incidents occurred in very different contexts, the security concerns and the consequences for patient confidentiality show remarkable similarities. Previous work provided initial case studies but did not, present empirical support to evaluate the usability of the G.S.T.
This paper, therefore, presents a series of empirical studies to evaluate the G.S.T. The remainder of the paper is structured as the following, section ‘Related work’ reviews the related work, section ‘The generic security template’ briefly introduces the Generic Security Template, section ‘Empirical study - compare G.S.T. with text-based approach’ presents the first empirical study, section ‘Extended study - evaluation using cognitive dimensions’ presents the second study, and section ‘Conclusions and future work’ summarises the paper.
There are a variety of definitions of trust . Two common definitions are reliability trust  and decision trust . In this paper, we refer to the reliability trust that is defined as the users’ subjective expectation about a service provider to perform a given action on which its welfare depends [13,14]. The public expects the healthcare organisation to securely protect their medical record while processing this information for different purposes such as medical diagnosis and researches. However, the repeats of the security incidents have undermined the public’s trust in the healthcare organisations information security management systems. There is a need for the organisations to learn the lessons from the security incidents and demonstrate to the public that those incidents have been treated seriously and are under control.
Sharing of security lessons
NIST [15,16] and SANS [17,18] have stressed the importance to share security lessons. They require that the insights from previous security breaches are documented, reviewed, presented and integrated back into the incident response process for future improvement. A growing number of regulatory agencies now provide detailed reports that are intended to help avoid any recurrence of previous failures. Security management systems have also been introduced into many healthcare organisations to ensure previous security incidents inform threat and risk assessments . Improving situation awareness, in particular about security breaches, help persuade end users of the importance of existing policies and procedures. There are further benefits from the wider dissemination of incident reports. Security engineers can learn important lessons about the analysis, containment, eradication, and recovery from previous attacks .
Evaluation of graphical notations
The introduction has argued that existing, text-based reports can be supported through the use of graphical notations that provide an overview of many dozens of pages of detailed prose. It is also hoped that this use of a semi-formal notation will encourage greater consistency and correctness [20,21]. Although graphical representations are often perceived as easier to understand, it can be difficult for readers to interpret the meaning of abstract symbols [22,23]. The notation introduces unfamiliar syntax and semantics. There is a danger that our use of these techniques can prevent stakeholders from understanding the arguments in security incident reports [24-26]. This paper, therefore, presents a series of empirical studies to evaluate the usability of graphical representations of security incident reports.
The generic security template
As mentioned, the G.S.T. extends the Goal Structuring Notations (GSN)  to provide an overview of previous security breaches. GSN is the dominant approach in the UK defence sector, increasingly being used in safety-critical industries to improve the structure, rigor, and clarity of design requirements. A particular strength is that it also links the evidence to show that particular requirements have been met. The same approach has more recently been extended to document security requirements [3,8]. There are four principal notations used in the GSN, A Goal is a claim, the statements that the goal structure is designed to support. Evidence exists to support the truth of the claimed goal, which can be documented by providing a solution in GSN. Strategy is inserted between goals at two levels of abstraction, to explain how the top-level goal is addressed by the aggregation of the goals presented at the lower level. Context is used to declare supplementary information and provide adequate understanding of the context surrounding the claim (or strategy). Usually it presents concepts clarification introduced in the claim (or strategy) .
The G.S.T. has customised the GSN. Instead of collecting evidence to support design and development requirements, it collects lessons (i.e. security causes and recommendations) from previous security incidents. These lessons are defined as the knowledge or understanding gained by experience . In the G.S.T., they refer to the security issues that cause a security breach, and the security recommendations intended to avoid any recurrence. The evidence of compliance with the security objectives is presented in the form of a specific security standard or guideline applied to the organisation where the security incident happened. This has reflected the granular information described in section ‘Introduction’. Generic, is defined as “characteristic of or relating to a class or group of things; not specific”. In other words, the intention is to create a GSN diagram that conveys the lessons learned from specific previous security breaches at a level of abstraction that helps others to use them to improve the security of other systems.
Empirical study - compare G.S.T. with text-based approach
Experiment objective and scope
Participants will be better able to identify the Lessons learned (security issues, security recommendations) in security incident report with the help of the G.S.T. than using Text-based Document alone;
Participants will be better able to identify the compliance with the security objectives in security incident report with the help of the G.S.T. than using Text-based Document alone;
The time taken to complete the designed task will be less using the G.S.T. than that using the text-based Document alone;
The task load will be lower using the G.S.T. than using the text-based Document alone.
Ease of use is compared qualitatively based on the feedback obtained from participants.
We evaluate the usability  in terms of the accuracy, efficiency, ease-of-use and task load compared to the conventional, text-based approach. Accuracy, is measured by assessing the quality of the security causes, recommendations and the compliance with the security objectives from the security incident. Efficiency, is measured by the time it takes to complete the experiment task. Ease of use, is evaluated by the feedback obtained from the post-experiment questionnaire. Task load, is measured by the application of NASA’s Task Load Index to assess workload .
Generic Security Template (G.S.T.), we used the same G.S.T. across all participants. This presents findings from the US Veteran’s Affairs administration 2007 Dataloss Incident . Text-based approach, we developed an executive summary (reduced to four pages) and a simplified security guideline (reduced to three pages) from the FISCAM. More details on the experiment material preparation are provided in ‘Experiment materials’.
Participants, the participants were post-graduate and undergraduate students with different education background. Tasks, the experiment itself lasted for maximum one hour. Participants had to identify causes, recommendations and the relationships with security objectives using either a conventional text-based document or using the graphical overview plus the existing report.
Experience with GSN, is defined as an extraneous variable in this experiment. People who have experience with GSN will have an obvious advantage in comprehending the security incident with the help of the G.S.T. People who have experience with GSN were excluded from this experiment.
Security incident report
Security Incident Report. The technical context of the task focused on a data loss incident involving the Veterans Affairs’ Administration . The original report was around 80 pages long and hence we could not use it directly within the time available for the experiment. We also felt that our more focused approach was more appropriate for an initial study that could, in turn, inform future empirical work over a longer period of time and with a larger number of participants. We, therefore, provided both groups with the executive summary from the VA report reduced to four pages. As is mentioned, the evidence of compliance with the security objectives is presented in the form of a specific security standard or guideline applied to the organisation where the security incident happened. Therefore, a simplified version of security guidelines (reduced to three pages) cited from the FISCAM that are relevant to this incident are also provided as a part of the security incident report.
The G.S.T. used in this experiment is created from the above mentioned security incident report only. It is an abstraction and extraction of the desirable information and did not bring any other information that can bias the results of the experiment.
We developed separate tasks description for the two groups and a post-experiment questionnaire, to provide subjective insights into perceived workload. A slightly different version of this post-experiment questionnaire was developed for the group using the graphical overview of the security incident. They were asked to provide information about the usability of the approach by completing subjective questionnaire.
The pilot study
Two security experts reviewed the design of the experiment pilot studies then helped to identify issues that had not been identified during the preparation of the materials. For example, they helped adjusting the complexity of the case study and suggested to reduce the incident report to four pages as mentioned in ‘Security incident report’. In the first pilot study, participants had to identify security issues, recommendations and compliance with the security objectives; writing them down using freestyle text. This was to simulate how security incident reports are analysed in practice, where people normally have no tools assisting them throughout this process. The feedback from the participants showed that the task was very mentally demanding and they were not able to complete it within one hour. We corrected this problem by introducing a table that provided guidance on the security issues and recommendations. The participants are required to fill in the blanks cells in the table. For the measurement of compliance with the security objectives, we have used multi-choice questions as the measurement mainly focuses on the relationships between the security objectives and the recommendations for prevention. Two more participants conducted a pilot test of the new experiment design. They were able to finish the tasks and stated that the level of mental effort was acceptable.
Experiment task design
In Group A, the experiment materials included the textual incident report (reduced executive summary and reduced security guidelines from FISCAM), the graphical G.S.T. and a task description. The pilot study had confirmed the arguments presented in the opening sections of this paper; that it can be difficult for readers to identify the causes, recommendation and the compliance with the security objectives of previous security incidents from existing textual reports. We, therefore, created tasks that guided the participants’ analysis:
An exempt of the security issue and recommendation table
Access Control Related
The IT Specialist was improperly given access to multiple data sources.
Task 2: Answer multiple-choice questions on compliance of the security objectives. This removed the additional contextual support of the tabular format used in task one and provided a stepping stone towards the open ended analysis of security incident reports that proved problematic in the pilot studies.
In Group B, the experiment materials included the textual incident report without the G.S.T. but participants had the same task descriptions as the first group.
There was only one treatment in the experiment using a between groups (Group A and B) design. The empirical comparisons are between one group using a conventional text-based document and the other using the graphical overview as well as the existing report.
To conduct research involving human participants, this experiment adhered to the BPS ethical guidelines, and has been approved by the ethics committee of the Glasgow University (ref: CSE01098). Information sheets were disseminated to each school of the redacted university. This has provided suitable coverage of participants from different background across the university. The participants attended this study voluntarily. The participants completed the consent form before starting the study. Twenty-four subjects were recruted and assigned to either of the two experimental conditions - using the textual report only or using both the textual report and the graphical overview. Group A consists of one undergraduate student and eleven postgraduate students, within which three of them have information security experience; Group B has one undergraduate student and eleven postgraduate students, within which three of them have information security experience. Each of the group has three females and nine males. None of them have experience with GSN or G.S.T.
The use of the students is justified for pragmatic and also for ethical reasons. Interviews with healthcare and IT professionals in healthcare organisations revealed that many lack formal training in security incident reporting and analysis; they come from varied backgrounds . The growing number of patient data breaches has also created enormous sensitivity; many employers are extremely unwilling to participate in studies of this nature even when anonymity is guaranteed .
Training of the participants
A pre-scripted familiarisation tutorial was provided before the experiment. Participants from both Group A and B attended the same tutorial session. This was to ensure that they received equal knowledge related to the handling of security incidents. The participants were introduced to the Goal Structuring Notations and G.S.T.
The experiment was conducted on a one-to-one mode to provide any support needed during the whole process including the familiarization tutorial session, the experiment session and the post-experiment questionnaire session. During the familiarisation tutorial session, the participant had unlimited time to study the material and to have any question clarified. The participants were allowed to refer to the tutorial document or notes. The participants were instructed to inform the experiment conductor if they had any trouble in understanding the questions. During the post-experiment questionnaire session, an informal interview was conducted to make sure their attitudes were consistent with the answers they have provided. They are also requested to write down their subjective feedback on the G.S.T.
Results - prepare the data
Scoring scheme for the experiment tasks
Sample answers for the experimental tasks were agreed on by two independent security experts.
Preparation for Task 1 - open-ended questions
For Task 1, the answers expected were qualitative. The marking was based on the description of security issues and recommendations expected from the sample answers. The answers for each task were marked by two further independent experts (Rater A and B) using an agreed scoring scheme. The participants’ answers were classified into four categories, which are “Correct”, “Incomplete”, “Wrong” and “Blank”. A correct answer completely described the recommendation to support the given issue; incomplete answers show that the participant had a partial understanding of the recommendation, but lacked comprehension of an important aspect of it. Wrong answers showed that the participant did not understand a particular recommendation. Blank, no answer was provided at all. The following paragraph provides an example from task one.
The report identifies the security concern: “The IT Specialist was improperly given access to multiple data sources”. An answer is marked as, Correct, if the participant states that the recommendation associated with this issue was to “Consider the conditions under which programmer level access may be granted for research project”. A correct answer completely describes the recommendation to support the given issue; Incomplete, if the answer is stated as “Ensure the access control is appropriately granted”. Incomplete answers show that the participant had a partial understanding of the recommendation, but lacked comprehension of an important aspect of it; Wrong, if the answer provided is not relevant to a particular recommendation. Blank, if no answer was provided at all.
Each participant was free to use his or her own words to describe the recommendations in this part of the study. The group identifiers were removed so that Rater A and B marked the answers without knowing whether or not the participants had access to the G.S.T. diagram.
Preparation for Task 2 - multi-choice questions
Task 2 used multi-choice questions to examine the participant’s ability in understanding the compliance with the security objectives. Less subjectivity was involved in interpreting the answers. There can be more than one correct choice for each question and participants were asked to select all of the responses they believe were relevant to the questions. Below is an example.
Develop and implement policies describing the conditions under which programmer level access may be granted for research purposes.
Effective procedures are implemented to determine compliance with authentication policies.
Attempts to log on with invalid passwords are limited. Use of easily guessed passwords (such as names or words) is prohibited.
None of the above
Correct answer: a, b
The sample answers were prepared by the independent security expert A. Each answer was classified as, Correct, Correct but broad, Incomplete, Incomplete and broad, Wrong, and Blank. A correct answer contained and only contained all the acceptable choices (e.g. a, b); Correct but broad contained all the acceptable choices, but also incorrect choices (e.g. a, b, c); Incomplete answers contained only some of the acceptable choices but not all (e.g. a). Incomplete and broad answers contained some of the acceptable choices and also other choices. (e.g. a, c); Wrong answers contained none of the acceptable choices (e.g. c). There was only one blank answer out of 144 responses; therefore we ignore this in the subsequent analysis.
Results - Analysis
Results for accuracy (Task 1)
The performance of Task 1 using Cross-tabulation by Rater A
Chi-Square Tests performance of Task 1 using Cross-tabulation by Rater A
N of Valid Cases
The performance of Task 1 using Cross-tabulation by Rater B
Chi-Square Tests performance of Task 1 using Cross-tabulation by Rater B
N of Valid Cases
Inter-rater reliability for Task 1 Question 1 (Rater A and B)
Asymp. Std. Error a
Measure of Agreement Kappa
N of Valid Cases
Inter-rater reliability for Task 1 Question 2 (Rater A and B)
Asymp. Std. Error a
Measure of Agreement Kappa
N of Valid Cases
Inter-rater reliability for Task 1 Question 3 (Rater A and B)
Asymp. Std. Error a
Measure of Agreement Kappa
N of Valid Cases
Inter-rater reliability for Task 1 Question 4 (Rater A and B)
Asymp. Std. Error a
Measure of Agreement Kappa
N of Valid Cases
Inter-rater reliability for Task 1 Question 5 (Rater A and B)
Asymp. Std. Error a
Measure of Agreement Kappa
N of Valid Cases
Inter-rater reliability for Task 1 Question 6 (Rater A and B)
Asymp. Std. Error a
Measure of Agreement Kappa
N of Valid Cases
Inter-rater reliability for Task 1 Question 7 (Rater A and B)
Asymp. Std. Error a
Measure of Agreement Kappa
N of Valid Cases
Landis and Koch-Kappa’s benchmark scale [ 30 ]
Strength of agreement
Less than 0.0
0.0 to 0.20
0.21 to 0.40
0.41 to 0.60
0.61 to 0.80
0.81 to 1.00
The results for accuracy (Task 2)
The performance of Task 2 using Cross-tabulation
Incomplete and broad
Chi-Square Tests performance of Task 2 using Cross-tabulation
Asymp. Sig. (2-sided)
N of Valid Cases
The results for efficiency (Time)
The mean total time used by Group A was almost equal that in Group B; 47.3 versus 47.8 minutes. The total time taken across all tasks is not statistically significant (P=0.932>0.05). Therefore, we can accept the null hypothesis that “the mean time taken to complete our experimental tasks using a textual security incident report and a textual report with a graphical overview are not significantly different”. Hypothesis H3 is not supported. One interpretation of these results is that significant time is required to understand security incidents, irrespective of whether they are presented in graphical or textual format. However, this would require further empirical support to determine whether or not other graphical notations might lead to significant differences in the time taken to understand security incident reports. It is also important for further work to consider the learning effects that might be expected through repeated use of the graphical maps.
The results for Task Load Index (TLX)
We used NASA’s Task Load Index  to assess workload using a post-evaluation questionnaire. The t-test results show a significant difference (P=0.047<0.05) in the first dimension of the task load index regarding “how mentally demanding was the whole task”. With a mean value of task load, 12.75 versus 15.50, participants expressed a lower subjective level of workload in terms of “mentally demand” when using the G.S.T. The results for the other four dimensions of the Task Load Index are not significantly different. However, a more sustained analysis is required to replicate these findings across a wider range of workload measures and with a larger sample of potential users.
In Group A, approximately half of the participants expressed some difficulty in understanding the text based Security Incident Report. Half of the participants reported that they have no difficulty in completing task 1 of Group A: identifying security elements from the security incident report with the help of the G.S.T. Group B reported a slightly higher level of understanding of the Security Incident Report. However, less than half of the participants suggested that they have no difficulty in completing task 1 of Group B: identifying lessons learned from the security incident report, and the rate is much lower than that of Group A. These subjective findings are consistent with the quantitative results in the quantitative analysis.
The participants’ answers to the open questions regarding the overall experience of using the graphical overviews suggested that a longer training session might have helped them to better prepare for the tasks. Several participants mentioned that they had experienced learning effects; their confidence in answering the questions increased as they worked their way through the questions. This finding from Group A reveals generally positive feedback for the G.S.T. Group B did not use the G.S.T. during the experiment. They were asked to review the G.S.T. after the experiment and provide the feedback by completing Questionnaire Section ‘Conclusions and future work’ designed for Group B. Almost all of them suggested that they would have no difficulty in understanding the G.S.T. and agreed that the G.S.T. can help them better comprehend existing security incident reports. Two thirds of the participants reported their willingness to use the G.S.T. if they are requested to do a similar task in future. “It will help to understand terminologies security elements easily, less confusing, very structured and don’t have to waste time, most importantly very easy to understand with less information”. In summary, the participants’ overall experience with the G.S.T. is positive, however, questions remain about the ability of participants to apply the lessons from the report within their own organisation rather than answering directed questions about the contents of a security report.
Threats to validity  are factors other than the independent variables that can affect the dependent variables.
Internal validity is concerned about the cause-effect relationships induced from the study. Maturity effects, there is a threat that the participants would tend to be bored and performed worse towards the end of the experiment session. However, we do not think that maturity effects will have undermined the validity of our results. As mentioned previously, several participants reported that their confidence in using the different reporting formats increased as they progressed through the tasks. Learning effect, there was not a learning effect in this experiment as there was only one treatment. Testing effects, all participants have studied the same material in the familiarisation tutorial session. Very few students have experience with security incident analysis. There was not any cheating because the experiment was on a one-to-one session. Instrument effects, the participants were given the same type of tasks and the answers were evaluated by the same marking scheme. Evaluator bias was addressed through the use of two independent security experts during the assessment phase. The group identifiers were removed so that Rater A and B marked the answers without knowing whether or not the participants had access to the G.S.T. diagram.
External validity is the possibility to generalise the results beyond the current experiment. We addressed these concerns by selecting a broad cross section of participants including individuals with diverse background to reflect the those of managers and technical staff who must cooperate to implement the recommendations in security incident reports. The participants were undergraduate and postgraduate students. Using students in such experiment is common for practical reasons when the professionals are less available and expensive. However, the generalisation of the results to different target groups needs to be carefully considered.
Extended study - evaluation using cognitive dimensions
The main empirical study has identified the benefits and difficulties using the G.S.T. However, it has not systematically evaluated the usability of G.S.T. as graphical notations. The extended study further explores the strength and weaknesses of the G.S.T. using Cognitive Dimensions framework .
Cognitive dimensions framework
Cognitive Dimensions framework provides a generic approach to measure various usability characteristics of notations and their environments . Previous research has argued the importance of using Cognitive Dimensions to evaluate graphical notations  and this approach has been assessed for validity and reliability by a number of other researchers [35-37]. There are fourteen dimensions in the full framework and below provides an example of the Visibility dimension, Example:(Visibility) It is easy to see or find the various parts of the Generic Security Template while it is being used? A. Strongly disagree B. Disagree C. Neutral D. Agree E. Strongly agree Explain what kind of things is difficult to see or find?
For our study, we did not ask about the creation or modification of the notation. Therefore we have selected five dimensions, which include Visibility, Diffuseness, Hard Mental Operation, Closeness of Mapping, and Role Expressiveness. The evaluation questionnaire was based on the Cognitive Dimensions of Notations Usability Framework.
The extended study is a follow-up study of the main empirical study. We interviewed the twelve participants in Group A. They already had experience using the G.S.T. Each individual contact lasted for approximately 20 minutes. The use of the Cognitive Dimensions aimed to identify the strengths and weakness of the G.S.T., for example, any strength that the user is in favour of, any weakness that affects usability, any opportunity for further improvements.
CD-Visibility dimension. Ten out of twelve of the participants agreed or strongly agreed that “It is easy to see or find the various parts of the G.S.T. while it is being used”. One participant disagreed and argued about the visibility of the goal structure. The comment was “might be difficult to differentiate between goals and sub goals”. The suggestions were “use of colour may help visual interpretation” and “introduction of colours to identify the different levels/layers”.
CD-Diffuseness dimension. Eleven out of twelve of the participants agreed or strongly agreed that “the G.S.T. lets you say what you want reasonably brief”. There was one participant against it and the reason was “too many words”. Too much information will undermine the effectiveness of the graphical presentation, while too little information will make it difficult to understand. Future work should focus on identifying an appropriate level of abstraction of the G.S.T.
CD-Hard mental operation dimension. Six out of twelve of the participants disagreed that “There seem some things especially complex or difficult to understand in your head while using the G.S.T.”. Two out of twelve of the participants agreed or strongly agreed and stated this was caused by “too many words within one notation”. They suggested to “separate recommendation into different or individual circles”.
CD-Closeness of mapping dimension. Nine out of twelve of the participants agreed or strongly agreed that “the G.S.T. describes the problem accurately and completely for the security incident stated in the textual document”. There was one participant against it and the feedback was “the case is not generic enough”, this is consistent with the comments on CD-Hard Mental Operation Dimension “with many words”. The participants also argue about separation of the recommendation notations, “it’s in some cases hard to separate the individual solutions in one bottom node into separate issues”, which had some overlap with the finding in the CD-Hard Mental Operation Dimension.
CD-Role expressiveness dimension. Seven out of twelve of the participants agreed or strongly agreed that “while reading the G.S.T., it is easy to tell what each part is for in the overall scheme”. One participant disagreed with it. The feedback was “might be hard to see whether the user wants to work on the high or low level of the hierarchy”. They suggested that “could use multiple cases” for different target groups with interest towards different level of information. This is consistent with the finding in an industiral evaluation of the G.S.T. They require a multi-view feature to meet the needs of different target groups including security managers, engineers and healthcare professionals .
Improvement suggestions for the G.S.T
Use of Color
... use of color may help visual interpretation;... introduction of colors to identify the different levels/layers....
Level of abstraction
...too many words...;...too many words within one notation...;...the template is not generic enough...
Separation of notations
CD-Closeness of Mapping; CD-Hard Mental Operation
... separate recommendation into different or individual circles;... the recommendation part needs to be simplified or separate individually [under suitable category];... it is in some cases hard to separate the individual solutions in one bottom node into separate issues...
... could use multiple templates;... might be hard to see whether the user wants to work on the high or low level of the hierarchy...
Conclusions and future work
The graphical G.S.T. captures the lessons learned from the security incidents and reasons about the information system security by attaching them to the security objectives of the organisation. It provides a way to communicate the information to different parties on how the remedial actions are taken in compliance with the organisational objectives as ways of avoiding future violations, hence increases their confidence and trust of organisations’ information security management systems . In this paper, we have presented the results derived from an initial study into the use of Generic Security Template to represent and reason about the recommendations made in a report of a data confidentiality breach involving the US Veterans’ Affairs Administration. We were able to show significant benefits from the use of a graphical technique in answering a number of comprehension questions when compared to the more conventional use of text-based incident reports. However, we could not demonstrate any significant benefits in terms of the time taken to complete our experimental tasks.
A list of suggestion to improve the Generic Security Template had been identified using the Cognitive Dimensions and from the subjective feedback. There are recommendations regarding the visibility of the Generic Security Template, to add colour to the Generic Security Template to improve the visualisation, and decomposition of the lessons learned notation to decompose the complex lessons learned notation that contains more than one learning points and the multi-view design for different target users. We will consider those recommendations in the future design of the Generic Security Template. In particular the use of students is a limitation, healthcare security professionals need to be involved in future validation.
Our work yields important insights into the difficulties that engineers face when trying to understand the implications that previous security incident reports have for their own organisations. There have been numerous empirical studies to evaluate the usability of graphical notations, including Entity-Relationship diagrams , UML [45,46] etc. However, as far as we are aware, there have been no previous studies to assess the strengths and weaknesses of graphical notations to help transfer the lessons learned from previous security incidents. These studies are urgently needed as both the Obama administration and the European Commission have recently published proposals to support the mandatory reporting of security incidents across national critical infrastructures, including healthcare. This provides the foundation for future work to further evaluate this approach with people working in healthcare industry.
We would like to thank Scottish Informatics and Computer Science Alliance (SICSA) for funding this research work.
- (2013) Internet Security Threat Report 2014 : Volume 18. Symantec Corporation, Mountain View.Google Scholar
- (2013) Internet Security Threat Report 2014 : Volume 19. Symantec Corporation, Mountain View.Google Scholar
- He Y, Johnson C (2012) Generic security cases for information system security in healthcare systems In: System Safety, incorporating the Cyber Security Conference 2012, 7th IET International Conference on, 1–6, IET, Edinburgh.Google Scholar
- Ahmad A, Hadgkiss J, Ruighaver AB (2012) Incident response teams-challenges in supporting the organisational security function. Comput Secur 31(5): 643–652.View ArticleGoogle Scholar
- Hadgkiss J (2006) Computer security incident response teams: exploring the incident learning capability. The University of Melbourne Australia, Melbourne.Google Scholar
- Hadgkiss J (1997) Computer security incident handling, step-by-step.. The SANS Institute, Bethesda.Google Scholar
- US Veterans’ Affairs Administration (2007) Administrative Investigation Loss of VA Information VA Medical Center Birmingham, AL, Report No. 07-01083-157. US Veterans’ Affairs Administration, Washington DC.Google Scholar
- He Y, Johnson C, Renaud K, Lu Y, Jebriel S (2014) An empirical study on the use of the generic security template for structuring the lessons from information security incidents In: Computer Science and Information Technology (CSIT), 2014 6th International Conference on, 178–188.. IEEE, Amman.View ArticleGoogle Scholar
- Kelly TP (1998) Arguing safety - A systematic approach to safety case management. Department of Computer Science, The University of York, York, UK.Google Scholar
- Dacey RF (2010) Federal Information System Controls Audit Manual (FISCAM). DIANE Publishing, Darby.Google Scholar
- He Y, Johnson C, Lu Y, Lin Y (2014) Improving the information security management: An industrial study in the privacy of electronic patient records In: Proceedings of the 2014 IEEE 27th International Symposium on Computer-Based Medical Systems, 525–526.. IEEE Computer Society, New York.View ArticleGoogle Scholar
- McKnight DH, Chervany NL (1996) The meanings of trust. State College, Citeseer.Google Scholar
- Gambetta D (2000) Can we trust trust. Trust Making Breaking Cooperative Relat 2000: 213–237.Google Scholar
- Jøsang A, Ismail R, Boyd C (2007) A survey of trust and reputation systems for online service provision. Decis Support Syst 43(2): 618–644.View ArticleGoogle Scholar
- West-Brown MJ, Stikvoort D, Kossakowski K-P, Killcrece G, Ruefle R (2003) Handbook for computer security incident response teams (csirts). Technical report, DTIC Document, Fort Belvoir.Google Scholar
- Grance T, Kent K, Kim B (2004) Computer security incident handling guide. NIST Special Publication, vol 800-61. National Institute of Standards and Technology, Gaithersburg.View ArticleGoogle Scholar
- Northcutt S (2001) Computer security incident handling: step by step, a survival guide for computer security incident handling. Sans Institute, Bethesda.Google Scholar
- Murray J (2007) Analysis of the incident handling six-step process In: SANS reading room. GIAC Research in the Common Body of Knowledge (CISSP) Retrieved September.Google Scholar
- European Commissioner (2009) DIRECTIVE 2009/140/EC of the European Parliament And Of The Council of 25 November 2009. European Commissioner, EU.Google Scholar
- Craigen D (1995) Formal methods technology transfer: Impediments and innovation In: CONCUR’95: Concurrency Theory, 328–332.. Springer, Philadelphia.Google Scholar
- Hinchey MG (2003) Confessions of a formal methodist In: Proceedings of the seventh Australian workshop conference on Safety critical systems and software 2002-Volume 15, 17–20.. Australian Computer Society, Inc, Sydney.Google Scholar
- Bauer MI, Johnson-Laird PN (1993) How diagrams can improve reasoning. Psychol Sci 4(6): 372–378.View ArticleGoogle Scholar
- Stenning K, Oberlander J (1995) A cognitive theory of graphical and linguistic reasoning: Logic and implementation. Cogn Sci 19(1): 97–140.View ArticleGoogle Scholar
- Finney K, Fedorec A (1996) An empirical study of specification readability. Teaching and Learning Formal Methods. Academic Press, New York.Google Scholar
- Finney K (1996) Mathematical notation in formal specification: Too difficult for the masses?IEEE Trans Softw Eng 22(2): 158–159.View ArticleGoogle Scholar
- Carew D, Exton C, Buckley J (2005) An empirical investigation of the comprehensibility of requirements specifications In: Empirical Software Engineering, 2005. 2005 International Symposium On, 10.. IEEE, Noosa Heads.Google Scholar
- Weber R, Aha DW, Becerra-Fernandez I (2001) Intelligent lessons learned systems. Expert Syst Appl 20(1): 17–34.View ArticleGoogle Scholar
- Folmer E, Bosch J (2004) Architecting for usability: a survey. J Syst Softw 70(1): 61–78.View ArticleGoogle Scholar
- Hart SG, Staveland LE (1988) Development of NASA-TLX (task load index): Results of empirical and theoretical research. Hum Mental Workload 1(3): 139–183.Google Scholar
- Landis JR, Koch GG (1977) The measurement of observer agreement for categorical data. Biometrics 33(1): 159–174.MATHMathSciNetView ArticleGoogle Scholar
- Everitt BS (1992) The analysis of contingency tables. vol. 45. CRC Press, London.Google Scholar
- Campbell DT, Stanley JC, Gage NL (1963) Experimental and quasi-experimental designs for research. Houghton Mifflin Boston, Boston.Google Scholar
- Green TRG, Petre M (1996) Usability analysis of visual programming environments: a‘cognitive dimensions’ framework. J Vis Languages Comput 7(2): 131–174.View ArticleGoogle Scholar
- He Y, Johnson C, Evangelopoulou M, Lin ZS (2014) Diagraming approach to structure the security lessons: Evaluation using cognitive dimensions In: Trust and Trustworthy Computing, 216–217.. Springer, Singapore.View ArticleGoogle Scholar
- Kutar M, Britton C, Barker T (2002) A comparison of empirical study and cognitive dimensions analysis in the evaluation of UML diagrams In: Procs of the 14th Workshop of the Psychology of Programming Interest Group (PPIG 14), Brighton.Google Scholar
- Triffitt E, Khazaei B (2002) A study of usability of Z formalism based on cognitive dimensions In: Proceedings of the 14 th Annual Meeting of the Psychology of Programming Interest Group (PPIG).. Citeseer, Brighton.Google Scholar
- Blackwell AF, Green TR (2000) A cognitive dimensions questionnaire optimised for users In: Proceedings of the Twelfth Annual Meeting of the Psychology of Programming Interest Group, 137–152.. Cozenza.Google Scholar
- He Y, Johnson C (2014) Improving incident learning in healthcare: An industrial study in the protection of electronic patient records In: International journal of medical informatics. under review.Google Scholar
- Polyvyanyy A, Smirnov S, Weske M (2008) Process model abstraction: A slider approach In: 12th International IEEE Enterprise Distributed Object Computing Conference, 325–331.. IEEE, Munich.View ArticleGoogle Scholar
- Smirnov S (2009) Structural aspects of business process diagram abstraction In: 11th IEEE Conference on Commerce and Enterprise Computing, 375–382.. IEEE, Vienna.Google Scholar
- Bench-Capon TJ, Dunne PE (2007) Argumentation in artificial intelligence. Artif Intell 171(10): 619–641.MATHMathSciNetView ArticleGoogle Scholar
- Mackinlay J (1986) Automating the design of graphical presentations of relational information. ACM Trans Graph (TOG) 5(2): 110–141.View ArticleGoogle Scholar
- Negnevitsky M (2005) Artificial intelligence: a guide to intelligent systems. Pearson Education, Oxford.Google Scholar
- Shoval P, Shiran S (21) Entity-relationship and object-oriented data modeling-an experimental comparison of design quality, 297–315.Google Scholar
- Glezer C, Last M, Nachmany E, Shoval P (2005) Quality and comprehension of UML interaction diagrams-an experimental comparison, 675–692.Google Scholar
- Razali R, Snook C, Poppleton M, Garratt P, Walters R (2007) Usability assessment of a UML-based formal modelling method In: 19th Annual Psychology of Programming Workshop (PPIG 2007), 56–71.. Citeseer, Joensuu.Google Scholar
This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly credited.