The Application of useless Japanese Inventions for Requirements Elicitation in Information Security.

Authors: Partridge, A. and Faily, S.

http://eprints.bournemouth.ac.uk/23840/

Start date: 11 July 2016

This data was imported from DBLP:

Authors: Partridge, A.

Editors: Faily, S., Jiang, N., Dogan, H. and Taylor, J.

http://eprints.bournemouth.ac.uk/23840/

http://ewic.bcs.org/category/18954

Journal: BCS HCI

Publisher: BCS

This data was imported from Scopus:

Authors: Partridge, A. and Faily, S.

http://eprints.bournemouth.ac.uk/23840/

Journal: Proceedings of the 30th International BCS Human Computer Interaction Conference, HCI 2016

Volume: 2016-July

© Partridge et al. Rules of requirements elicitation in security are broken through the use of Chindōgu, by designing impractical security countermeasures in the first instance, then using these to create usable security requirements. We present a process to conceive the requirements in Chindōgu form. We evaluate the usefulness of this process by applying it in three workshops with data gathered from a European rail company, and comparing requirements elicited by this process with a set of control requirements.

The data on this page was last updated at 04:56 on March 21, 2019.