Barry is not the weakest link: Eliciting secure system requirements with personas

This source preferred by Shamal Faily

This data was imported from DBLP:

Authors: Faily, S. and Flechais, I.

Editors: McEwan, T. and McKinnon, L.

http://www.informatik.uni-trier.de/~ley/db/conf/bcshci/bcshci2010.html

Journal: BCS HCI

Pages: 124-132

Publisher: ACM

This data was imported from Scopus:

Authors: Faily, S. and Fléchais, I.

Journal: Proceedings of the 2010 British Computer Society Conference on Human-Computer Interaction, BCS-HCI 2010

Pages: 124-132

© 2010 ACM. All rights reserved. Building secure and usable systems means specifying systems for the people using it and the tasks they carry out, rather than vice-versa. User-Centered design approaches encourage an early focus on users and their contexts of use, but these need to be integrated with approaches for engineering secure systems. This paper describes how personas can augment a process for eliciting and specifying requirements for secure and usable systems. Our results suggest that personas increase stakeholder empathy towards users represented by personas, and the empirical data used to build personas can also be used to obtain a better understanding of prospective attackers and their motivations.

The data on this page was last updated at 05:12 on February 21, 2020.