Visualising personas as goal models to find security tensions

Authors: Faily, S., Iacob, C., Ali, R. and Ki-Aries, D.

Journal: Information and Computer Security

Volume: 29

Issue: 5

Pages: 787-815

eISSN: 2056-497X

ISSN: 2056-4961

DOI: 10.1108/ICS-03-2021-0035

Abstract:

Purpose: This paper aims to present a tool-supported approach for visualising personas as social goal models, which can subsequently be used to identify security tensions. Design/methodology/approach: The authors devised an approach to partially automate the construction of social goal models from personas. The authors provide two examples of how this approach can identify previously hidden implicit vulnerabilities and validate ethical hazards faced by penetration testers and their safeguards. Findings: Visualising personas as goal models makes it easier for stakeholders to see implications of their goals being satisfied or denied and designers to incorporate the creation and analysis of such models into the broader requirements engineering (RE) tool-chain. Originality/value: The approach can be used with minimal changes to existing user experience and goal modelling approaches and security RE tools.

https://eprints.bournemouth.ac.uk/35329/

Source: Scopus

Visualising personas as goal models to find security tensions

Authors: Faily, S., Iacob, C., Ali, R. and Ki-Aries, D.

Journal: INFORMATION AND COMPUTER SECURITY

Volume: 29

Issue: 5

Pages: 787-815

ISSN: 2056-4961

DOI: 10.1108/ICS-03-2021-0035

https://eprints.bournemouth.ac.uk/35329/

Source: Web of Science (Lite)

Visualising Personas as Goal Models to Find Security Tensions

Authors: Faily, S., Iacob, C., Ali, R. and Ki-Aries, D.

Journal: Information and Computer Security

Publisher: Emerald

ISSN: 2056-4961

Abstract:

This paper presents a tool-supported approach for visualising personas as social goal models, which can subsequently be used to identify security tensions.

We devised an approach for partially automating the construction of social goal models from personas. We provide two examples of how this approach can be used to identify previously hidden implicit vulnerabilities, and validate ethical hazards faced by penetration testers and safeguards that address them.

Visualising personas as goal models makes it easier for stakeholders to see implications of their goals being satisfied or denied, and designers to incorporate the creation and analysis of such models into the broader RE tool-chain.

Our approach can be adopted with minimal changes to existing User Experience (UX) and goal modelling approaches and Security Requirements Engineering tools.

https://eprints.bournemouth.ac.uk/35329/

Source: Manual

Visualising Personas as Goal Models to Find Security Tensions

Authors: Faily, S., Iacob, C., Ali, R. and Ki-Aries, D.

Journal: Information and Computer Security

Volume: 29

Issue: 5

Pages: 787-815

ISSN: 2056-4961

Abstract:

This paper presents a tool-supported approach for visualising personas as social goal models, which can subsequently be used to identify security tensions. We devised an approach for partially automating the construction of social goal models from personas. We provide two examples of how this approach can be used to identify previously hidden implicit vulnerabilities, and validate ethical hazards faced by penetration testers and safeguards that address them. Visualising personas as goal models makes it easier for stakeholders to see implications of their goals being satisfied or denied, and designers to incorporate the creation and analysis of such models into the broader RE tool-chain. Our approach can be adopted with minimal changes to existing User Experience (UX) and goal modelling approaches and Security Requirements Engineering tools.

https://eprints.bournemouth.ac.uk/35329/

Source: BURO EPrints