{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T20:05:17Z","timestamp":1760385917593,"version":"3.40.5"},"reference-count":42,"publisher":"IGI Global","issue":"4","license":[{"start":{"date-parts":[[2022,6,24]],"date-time":"2022-06-24T00:00:00Z","timestamp":1656028800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/deed.en_US"},{"start":{"date-parts":[[2022,6,24]],"date-time":"2022-06-24T00:00:00Z","timestamp":1656028800000},"content-version":"am","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/deed.en_US"},{"start":{"date-parts":[[2022,6,24]],"date-time":"2022-06-24T00:00:00Z","timestamp":1656028800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/deed.en_US"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,6,24]]},"abstract":"<p>To address this research possibility, the present empirical study undertakes the assessment of usable-security of healthcare software system.  The attributes considered for the assessment are: four factors at first level; thirteen sub-factors at the second level with six Hospital Management Software Systems (HMSS) as alternatives. Fuzzy Analytic Network Process (F-ANP) has been applied for evaluating the weights of the attributes and their relationship with one other. Finally, fuzzy Technique for Order of Preference by Similarity to Ideal Solutions (F-TOPSIS) technique has been applied and alternatives ranking has been estimated. Results of the study conclude that HMSS-1 provides better usable\u2013security. Furthermore, as analysed, F-TOPSIS produced more convincing results in assessing the usable-security of the HMSS. This research analysis also corroborates that when compared with the Classical ANP TOPSIS, the Fuzzy-ANP TOPSIS is the ideal methodology for producing accurate results.<\/p>","DOI":"10.4018\/ijsda.304444","type":"journal-article","created":{"date-parts":[[2022,6,24]],"date-time":"2022-06-24T18:06:30Z","timestamp":1656093990000},"page":"1-24","source":"Crossref","is-referenced-by-count":1,"title":["Usable-Security Assessment of Healthcare Software System Through Fuzzy ANP-TOPSIS Method"],"prefix":"10.4018","volume":"10","author":[{"given":"Adil Hussain","family":"Seh","sequence":"first","affiliation":[{"name":"Department of Information Technology, Babasaheb Bhimrao Ambedkar University, Lucknow, India"}]},{"given":"Masood","family":"Ahmad","sequence":"additional","affiliation":[{"name":"Department of Information Technology, Babasaheb Bhimrao Ambedkar University, Lucknow, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4244-8076","authenticated-orcid":true,"given":"Mohd","family":"Nadeem","sequence":"additional","affiliation":[{"name":"Department of Information Technology, Babasaheb Bhimrao Ambedkar University, Lucknow, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4021-9819","authenticated-orcid":true,"given":"Abhishek Kumar","family":"Pandey","sequence":"additional","affiliation":[{"name":"Department of Computer Science,  M. L. K. P. G. College, Balrampur- 271201, Uttar Pradesh, India"}]},{"given":"Alka","family":"Agrawal","sequence":"additional","affiliation":[{"name":"Department of Information Technology, Babasaheb Bhimrao Ambedkar University, Lucknow, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1813-1362","authenticated-orcid":true,"given":"Rajeev","family":"Kumar","sequence":"additional","affiliation":[{"name":"Department of Computer Applications, Shri Ramswaroop Memorial University, Barabanki-225003, Uttar Pradesh, India"}]},{"given":"Raees Ahmad","family":"Khan","sequence":"additional","affiliation":[{"name":"Department of Information Technology, Babasaheb Bhimrao Ambedkar University, Lucknow, India"}]}],"member":"2432","reference":[{"key":"IJSDA.304444-0","unstructured":"Agrawal, A., Alenezi, M., Khan, S. A., Kumar, R., & Khan, R. A. (2019). Multi-level fuzzy system for usable-security assessment. Journal of King Saud University-Computer and Information Sciences, 1-9."},{"key":"IJSDA.304444-1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2946776"},{"key":"IJSDA.304444-2","doi-asserted-by":"crossref","unstructured":"Agrawal, A., Seh, A. H., Baz, A., Alhakami, H., Alhakami, W., Baz, M., & Khan, R. A. (2020). Software security estimation using the hybrid fuzzy ANP-TOPSIS approach: Design tactics perspective. Symmetry, 12(4), 1-21.","DOI":"10.3390\/sym12040598"},{"issue":"6","key":"IJSDA.304444-3","first-page":"453","article-title":"Usable-security attribute evaluation using fuzzy analytic hierarchy process.","volume":"13","author":"M.Alenezi","year":"2019","journal-title":"ICIC Express Letters"},{"key":"IJSDA.304444-4","doi-asserted-by":"publisher","DOI":"10.4018\/IJSDA.2020070102"},{"key":"IJSDA.304444-5","doi-asserted-by":"publisher","DOI":"10.4018\/IJSDA.2020070103"},{"key":"IJSDA.304444-6","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-015-1891-2"},{"issue":"9","key":"IJSDA.304444-7","first-page":"24551","article-title":"Evaluation of Indian B2C E-shopping websites under multi criteria decision-making using fuzzy hybrid technique.","volume":"10","author":"S.Dey","year":"2015","journal-title":"International Journal of Applied Engineering Research: IJAER"},{"key":"IJSDA.304444-8","doi-asserted-by":"publisher","DOI":"10.5120\/ijca2017913632"},{"journal-title":"Cryptography & network security","year":"2007","author":"B. A.Forouzan","key":"IJSDA.304444-9"},{"key":"IJSDA.304444-10","doi-asserted-by":"publisher","DOI":"10.4018\/IJSDA.2020070101"},{"key":"IJSDA.304444-11","doi-asserted-by":"publisher","DOI":"10.4018\/IJSDA.2020040101"},{"key":"IJSDA.304444-12","doi-asserted-by":"publisher","DOI":"10.4018\/IJSDA.2020010103"},{"key":"IJSDA.304444-13","unstructured":"Gorski, P. L., & Iacono, L. L. (2016, July). Towards the Usability Evaluation of Security APIs. HAISA, 10, 252-265."},{"key":"IJSDA.304444-14","unstructured":"IBM. (2019). Marketing Cloud -10 Key Marketing Trends for 2017. Retrieved from https:\/\/public.dhe.ibm.com\/common\/ssi\/ecm\/wr\/en\/wrl12345usen\/watsoncustomer-engagement-watson-marketing-wr-other-papers-and-reports-wrl12345usen-20170719"},{"key":"IJSDA.304444-15","unstructured":"ISO. (2009). ISO\/IEC 27000:2009(en). Retrieved from https:\/\/www.iso.org\/obp\/ui\/#iso:std:iso-iec:27000:ed-1:v1:en"},{"key":"IJSDA.304444-16","unstructured":"ISO. (2014): ISO 16336:2014(en) - Robust parameter design (RPD). Retrieved from https:\/\/www.iso.org\/obp\/ui\/#iso:std:iso:16336:ed-1:v1:en"},{"key":"IJSDA.304444-17","unstructured":"ISO. (2019). Human-centred design for interactive systems. Retrieved from https:\/\/www.iso.org\/obp\/ui\/#iso:std:iso:9241:-210:ed-1:v1:en"},{"key":"IJSDA.304444-18","doi-asserted-by":"publisher","DOI":"10.4018\/IJSDA.2020040102"},{"key":"IJSDA.304444-19","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.07.054"},{"key":"IJSDA.304444-20","doi-asserted-by":"publisher","DOI":"10.2991\/ijcis.d.190513.001"},{"key":"IJSDA.304444-21","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-017-2039-1"},{"key":"IJSDA.304444-22","doi-asserted-by":"publisher","DOI":"10.1007\/s13762-015-0819-9"},{"key":"IJSDA.304444-23","doi-asserted-by":"publisher","DOI":"10.1016\/0377-2217(94)90282-8"},{"key":"IJSDA.304444-24","doi-asserted-by":"publisher","DOI":"10.1016\/S0305-0548(99)00057-X"},{"key":"IJSDA.304444-25","doi-asserted-by":"crossref","unstructured":"Loshin, D. (2009). Data Quality and MDM. Retrieved from https:\/\/www.sciencedirect.com\/science\/article\/pii\/B9780123742254000059","DOI":"10.1016\/B978-0-12-374225-4.00005-9"},{"issue":"2","key":"IJSDA.304444-26","first-page":"66","article-title":"An integrated approach of Fuzzy ANP and Fuzzy TOPSIS for R&D project selection: A case study.","volume":"6","author":"A.Mohaghar","year":"2012","journal-title":"Australian Journal of Basic and Applied Sciences"},{"key":"IJSDA.304444-27","doi-asserted-by":"publisher","DOI":"10.3837\/tiis.2014.06.016"},{"key":"IJSDA.304444-28","doi-asserted-by":"publisher","DOI":"10.1145\/505248.506010"},{"journal-title":"Software engineering: a practitioner\u2019s approach","year":"2005","author":"R. S.Pressman","key":"IJSDA.304444-29"},{"key":"IJSDA.304444-30","doi-asserted-by":"crossref","unstructured":"Rekik, R., Kallel, I., & Alimi, A. M. (2016, October). Ranking criteria based on fuzzy ANP for assessing E-commerce web sites. In 2016 IEEE international conference on systems, man, and cybernetics (SMC) (pp. 3469-3474). IEEE.","DOI":"10.1109\/SMC.2016.7844770"},{"key":"IJSDA.304444-31","doi-asserted-by":"publisher","DOI":"10.4018\/IJSDA.2020070104"},{"journal-title":"Fuzzy logic with engineering applications","year":"2005","author":"T. J.Ross","key":"IJSDA.304444-32"},{"issue":"1","key":"IJSDA.304444-33","first-page":"492","article-title":"An integrated fuzzy ANP and TOPSIS methodology for software selection under MCDM perspective.","volume":"6","author":"B.Roy","year":"2018","journal-title":"Int. J. Innov. Res. Comput. Commun. Eng"},{"key":"IJSDA.304444-34","first-page":"70","article-title":"The Analytic Hierarchy Process Mcgraw Hill, New York.","author":"T. L.Saaty","year":"1980","journal-title":"Agricultural Economics Review"},{"key":"IJSDA.304444-35","first-page":"1","article-title":"The analytic network process","author":"T. L.Saaty","year":"2013","journal-title":"Decision making with the analytic network process"},{"journal-title":"Usable security: Why do we need it? How do we get it?","year":"2005","author":"M. A.Sasse","key":"IJSDA.304444-36"},{"key":"IJSDA.304444-37","doi-asserted-by":"crossref","unstructured":"Seh, A. H., Zarour, M., Alenezi, M., Sarkar, A. K., Agrawal, A., Kumar, R., & Khan, R. A. (2020, June). Healthcare Data Breaches: Insights and Implications. Healthcare Multidisciplinary Digital Publishing Institute, 8(2), 133.","DOI":"10.3390\/healthcare8020133"},{"key":"IJSDA.304444-38","doi-asserted-by":"publisher","DOI":"10.3390\/pr7020118"},{"issue":"4","key":"IJSDA.304444-39","first-page":"177","article-title":"A new car selection in the market using TOPSIS technique.","volume":"2","author":"S.Srikrishna","year":"2014","journal-title":"International Journal of Engineering Research and General Science"},{"key":"IJSDA.304444-40","unstructured":"USA Today. (2019). Billions of records exposed. Retrieved from https:\/\/www.usatoday.com\/story\/money\/2019\/08\/18\/2019-on-track-to-become-Worst-Year-ever-for-data-breaches\/39963021\/"},{"key":"IJSDA.304444-41","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2007.01.001"}],"container-title":["International Journal of System Dynamics Applications"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=304444","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,16]],"date-time":"2023-01-16T22:35:00Z","timestamp":1673908500000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJSDA.304444"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2022,6,24]]},"references-count":42,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,10]]}},"URL":"https:\/\/doi.org\/10.4018\/ijsda.304444","relation":{},"ISSN":["2160-9772","2160-9799"],"issn-type":[{"type":"print","value":"2160-9772"},{"type":"electronic","value":"2160-9799"}],"subject":[],"published":{"date-parts":[[2022,6,24]]}}}