Barry is not the weakest link: eliciting secure system requirements with personas.

This source preferred by Shamal Faily

This data was imported from DBLP:

Authors: Faily, S. and Flechais, I.

Editors: McEwan, T. and McKinnon, L.

http://www.informatik.uni-trier.de/~ley/db/conf/bcshci/bcshci2010.html

Journal: BCS HCI

Pages: 124-132

Publisher: ACM

The data on this page was last updated at 04:43 on November 23, 2017.