Finding and resolving security misusability with misusability cases

Authors: Faily, S. and Fléchais, I.

Journal: Requirements Engineering

Volume: 21

Issue: 2

Pages: 209-223

eISSN: 1432-010X

ISSN: 0947-3602

DOI: 10.1007/s00766-014-0217-8

Abstract:

Although widely used for both security and usability concerns, scenarios used in security design may not necessarily inform the design of usability, and vice-versa. One way of using scenarios to bridge security and usability involves explicitly describing how design decisions can lead to users inadvertently exploiting vulnerabilities to carry out their production tasks. This paper describes how misusability cases, scenarios that describe how design decisions may lead to usability problems subsequently leading to system misuse, address this problem. We describe the related work upon which misusability cases are based before presenting the approach, and illustrating its application using a case study example. Finally, we describe some findings from this approach that further inform the design of usable and secure systems.

https://eprints.bournemouth.ac.uk/21646/

Source: Scopus

Finding and resolving security misusability with misusability cases

Authors: Faily, S. and Flechais, I.

Journal: REQUIREMENTS ENGINEERING

Volume: 21

Issue: 2

Pages: 209-223

eISSN: 1432-010X

ISSN: 0947-3602

DOI: 10.1007/s00766-014-0217-8

https://eprints.bournemouth.ac.uk/21646/

Source: Web of Science (Lite)

Finding and Resolving Security Misusability with Misusability Cases

Authors: Faily, S. and Fléchais, I.

Journal: Requirements Engineering

Volume: 21

Issue: 2

Pages: 209-223

Publisher: Springer

DOI: 10.1007/s00766-014-0217-8

https://eprints.bournemouth.ac.uk/21646/

Source: Manual

Finding and resolving security misusability with misusability cases.

Authors: Faily, S. and Flechais, I.

Journal: Requir. Eng.

Volume: 21

Pages: 209-223

https://eprints.bournemouth.ac.uk/21646/

Source: DBLP