The application of useless Japanese inventions for requirements elicitation in information security
This data was imported from Scopus:
Authors: Partridge, A. and Faily, S.
Journal: Proceedings of the 30th International BCS Human Computer Interaction Conference, HCI 2016
© Partridge et al. Rules of requirements elicitation in security are broken through the use of Chindōgu, by designing impractical security countermeasures in the first instance, then using these to create usable security requirements. We present a process to conceive the requirements in Chindōgu form. We evaluate the usefulness of this process by applying it in three workshops with data gathered from a European rail company, and comparing requirements elicited by this process with a set of control requirements.