Visualising personas as goal models to find security tensions
Authors: Faily, S., Iacob, C., Ali, R. and Ki-Aries, D.
Journal: Information and Computer Security
Volume: 29
Issue: 5
Pages: 787-815
eISSN: 2056-497X
ISSN: 2056-4961
DOI: 10.1108/ICS-03-2021-0035
Abstract:Purpose: This paper aims to present a tool-supported approach for visualising personas as social goal models, which can subsequently be used to identify security tensions. Design/methodology/approach: The authors devised an approach to partially automate the construction of social goal models from personas. The authors provide two examples of how this approach can identify previously hidden implicit vulnerabilities and validate ethical hazards faced by penetration testers and their safeguards. Findings: Visualising personas as goal models makes it easier for stakeholders to see implications of their goals being satisfied or denied and designers to incorporate the creation and analysis of such models into the broader requirements engineering (RE) tool-chain. Originality/value: The approach can be used with minimal changes to existing user experience and goal modelling approaches and security RE tools.
https://eprints.bournemouth.ac.uk/35329/
Source: Scopus
Visualising personas as goal models to find security tensions
Authors: Faily, S., Iacob, C., Ali, R. and Ki-Aries, D.
Journal: INFORMATION AND COMPUTER SECURITY
Volume: 29
Issue: 5
Pages: 787-815
ISSN: 2056-4961
DOI: 10.1108/ICS-03-2021-0035
https://eprints.bournemouth.ac.uk/35329/
Source: Web of Science (Lite)
Visualising Personas as Goal Models to Find Security Tensions
Authors: Faily, S., Iacob, C., Ali, R. and Ki-Aries, D.
Journal: Information and Computer Security
Publisher: Emerald
ISSN: 2056-4961
Abstract:This paper presents a tool-supported approach for visualising personas as social goal models, which can subsequently be used to identify security tensions.
We devised an approach for partially automating the construction of social goal models from personas. We provide two examples of how this approach can be used to identify previously hidden implicit vulnerabilities, and validate ethical hazards faced by penetration testers and safeguards that address them.
Visualising personas as goal models makes it easier for stakeholders to see implications of their goals being satisfied or denied, and designers to incorporate the creation and analysis of such models into the broader RE tool-chain.
Our approach can be adopted with minimal changes to existing User Experience (UX) and goal modelling approaches and Security Requirements Engineering tools.
https://eprints.bournemouth.ac.uk/35329/
Source: Manual
Visualising Personas as Goal Models to Find Security Tensions
Authors: Faily, S., Iacob, C., Ali, R. and Ki-Aries, D.
Journal: Information and Computer Security
Volume: 29
Issue: 5
Pages: 787-815
ISSN: 2056-4961
Abstract:This paper presents a tool-supported approach for visualising personas as social goal models, which can subsequently be used to identify security tensions. We devised an approach for partially automating the construction of social goal models from personas. We provide two examples of how this approach can be used to identify previously hidden implicit vulnerabilities, and validate ethical hazards faced by penetration testers and safeguards that address them. Visualising personas as goal models makes it easier for stakeholders to see implications of their goals being satisfied or denied, and designers to incorporate the creation and analysis of such models into the broader RE tool-chain. Our approach can be adopted with minimal changes to existing User Experience (UX) and goal modelling approaches and Security Requirements Engineering tools.
https://eprints.bournemouth.ac.uk/35329/
Source: BURO EPrints