The application of useless Japanese inventions for requirements elicitation in information security

Authors: Partridge, A. and Faily, S.

Journal: Proceedings of the 30th International BCS Human Computer Interaction Conference, HCI 2016

Volume: 2016-July

Abstract:

Rules of requirements elicitation in security are broken through the use of Chindōgu, by designing impractical security countermeasures in the first instance, then using these to create usable security requirements. We present a process to conceive the requirements in Chindōgu form. We evaluate the usefulness of this process by applying it in three workshops with data gathered from a European rail company, and comparing requirements elicited by this process with a set of control requirements.

https://eprints.bournemouth.ac.uk/23840/

Source: Scopus

The application of useless japanese inventions for requirements elicitation in information security

Authors: Partridge, A. and Faily, S.

Conference: 30th British HCI Group Annual Conference on People and Computers: Fusion

Dates: 11-15 July 2016

https://eprints.bournemouth.ac.uk/23840/

Source: Manual

The Application of useless Japanese Inventions for Requirements Elicitation in Information Security.

Authors: Partridge, A. and Faily, S.

Editors: Jiang, N., Dogan, H. and Taylor, J.

Journal: BCS HCI

Publisher: BCS

https://eprints.bournemouth.ac.uk/23840/

http://ewic.bcs.org/category/18954

Source: DBLP

The application of useless Japanese inventions for requirements elicitation in information security

Authors: Partridge, A. and Faily, S.

Conference: 30th British HCI Group Annual Conference on People and Computers: Fusion

https://eprints.bournemouth.ac.uk/23840/

Source: BURO EPrints