The application of useless Japanese inventions for requirements elicitation in information security
Authors: Partridge, A. and Faily, S.
Journal: Proceedings of the 30th International BCS Human Computer Interaction Conference, HCI 2016
Volume: 2016-July
Abstract:Rules of requirements elicitation in security are broken through the use of Chindōgu, by designing impractical security countermeasures in the first instance, then using these to create usable security requirements. We present a process to conceive the requirements in Chindōgu form. We evaluate the usefulness of this process by applying it in three workshops with data gathered from a European rail company, and comparing requirements elicited by this process with a set of control requirements.
https://eprints.bournemouth.ac.uk/23840/
Source: Scopus
The application of useless japanese inventions for requirements elicitation in information security
Authors: Partridge, A. and Faily, S.
Conference: 30th British HCI Group Annual Conference on People and Computers: Fusion
Dates: 11-15 July 2016
https://eprints.bournemouth.ac.uk/23840/
Source: Manual
The Application of useless Japanese Inventions for Requirements Elicitation in Information Security.
Authors: Partridge, A. and Faily, S.
Editors: Jiang, N., Dogan, H. and Taylor, J.
Journal: BCS HCI
Publisher: BCS
https://eprints.bournemouth.ac.uk/23840/
http://ewic.bcs.org/category/18954
Source: DBLP
The application of useless Japanese inventions for requirements elicitation in information security
Authors: Partridge, A. and Faily, S.
Conference: 30th British HCI Group Annual Conference on People and Computers: Fusion
https://eprints.bournemouth.ac.uk/23840/
Source: BURO EPrints