Identifying Implicit Vulnerabilities Through Personas as Goal Models

Authors: Faily, S., Iacob, C., Ali, R. and Ki-Aries, D.

Journal: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Volume: 12501 LNCS

Pages: 185-202

eISSN: 1611-3349

ISSN: 0302-9743

DOI: 10.1007/978-3-030-64330-0_12

Abstract:

When used in requirements processes and tools, personas have the potential to identify vulnerabilities resulting from misalignment between user expectations and system goals. Typically, however, this potential is unfulfilled as personas and system goals are captured with different mindsets, by different teams, and for different purposes. If personas are visualised as goal models, it may be easier for stakeholders to see implications of their goals being satisfied or denied, and designers to incorporate the creation and analysis of such models into the broader RE tool-chain. This paper outlines a tool-supported approach for finding implicit vulnerabilities from user and system goals by reframing personas as social goal models. We illustrate this approach with a case study where previously hidden vulnerabilities based on human behaviour were identified.

https://eprints.bournemouth.ac.uk/34422/

Source: Scopus

Identifying Implicit Vulnerabilities through Personas as Goal Models

Authors: Faily, S., Iacob, C., Ali, R. and Ki-Aries, D.

Conference: 4th International Workshop on SECurity and Privacy Requirements Engineering (SECPRE 2020)

Dates: 14-18 September 2020

Publisher: Springer

DOI: 10.1007/978-3-030-64330-0_12

https://eprints.bournemouth.ac.uk/34422/

Source: Manual

Identifying Implicit Vulnerabilities through Personas as Goal Models.

Authors: Faily, S., Iacob, C., Ali, R. and Ki-Aries, D.

Journal: CoRR

Volume: abs/2008.04773

https://eprints.bournemouth.ac.uk/34422/

Source: DBLP

Identifying Implicit Vulnerabilities through Personas as Goal Models

Authors: Faily, S., Iacob, C., Ali, R. and Ki-Aries, D.

Abstract:

When used in requirements processes and tools, personas have the potential to identify vulnerabilities resulting from misalignment between user expectations and system goals. Typically, however, this potential is unfulfilled as personas and system goals are captured with different mindsets, by different teams, and for different purposes. If personas are visualised as goal models, it may be easier for stakeholders to see implications of their goals being satisfied or denied, and designers to incorporate the creation and analysis of such models into the broader RE tool-chain. This paper outlines a tool-supported approach for finding implicit vulnerabilities from user and system goals by reframing personas as social goal models. We illustrate this approach with a case study where previously hidden vulnerabilities based on human behaviour were identified.

https://eprints.bournemouth.ac.uk/34422/

Source: arXiv

Identifying Implicit Vulnerabilities through Personas as Goal Models

Authors: Faily, S., Iacob, C., Ali, R. and Ki-Aries, D.

Conference: 4th International Workshop on SECurity and Privacy Requirements Engineering (SECPRE 2020)

Publisher: Springer

Abstract:

When used in requirements processes and tools, personas have the potential to identify vulnerabilities resulting from misalignment between user expectations and system goals. Typically, however, this potential is unfulfilled as personas and system goals are captured with different mindsets, by different teams, and for different purposes. If personas are visualised as goal models, it may be easier for stakeholders to see implications of their goals being satisfied or denied, and designers to incorporate the creation and analysis of such models into the broader RE tool-chain. This paper outlines a tool-supported approach for finding implicit vulnerabilities from user and system goals by reframing personas as social goal models. We illustrate this approach with a case study where previously hidden vulnerabilities based on human behaviour were identified.

https://eprints.bournemouth.ac.uk/34422/

Source: BURO EPrints