Engaging stakeholders during late stage security design with assumption personas

This source preferred by Shamal Faily

Authors: Faily, S.

Editors: Furnell, S.

http://eprints.bournemouth.ac.uk/22704/

Journal: Information and Computer Security

Volume: 23

Issue: 4

Pages: 435-446

Publisher: Emerald

This data was imported from DBLP:

Authors: Faily, S.

http://eprints.bournemouth.ac.uk/22704/

Journal: Inf. & Comput. Security

Volume: 23

Pages: 435-446

DOI: 10.1108/ICS-10-2014-0066

This data was imported from Web of Science (Lite):

Authors: Faily, S.

http://eprints.bournemouth.ac.uk/22704/

Journal: INFORMATION AND COMPUTER SECURITY

Volume: 23

Issue: 4

Pages: 435-446

ISSN: 2056-4961

DOI: 10.1108/ICS-10-2014-0066

The data on this page was last updated at 04:43 on November 23, 2017.