2,000
views
0
recommends
+1 Recommend
1 collections
    4
    shares

      Celebrating 65 years of The Computer Journal - free-to-read perspectives - bcs.org/tcj65

      scite_
       
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      Human-Centered Specification Exemplars for Critical Infrastructure Environments

      proceedings-article
        1 , 2 , 1 , 2 , 1 , 1
      Proceedings of the 30th International BCS Human Computer Interaction Conference (HCI)
      Fusion
      11 - 15 July 2016
      Critical Infrastructure, Specification Exemplars, Personas, Tasks, Risks, CAIRIS, Water, Rail
      Bookmark

            Abstract

            Specification models of critical infrastructure focus on parts of a larger environment. However, to consider the security of critical infrastructure systems, we need approaches for modelling the sum of these parts; these include people and activities, as well as technology. This paper present human-centered specification exemplars that capture the nuances associated with interactions between people, technology, and critical infrastructure environments. We describe requirements each exemplar needs to satisfy, and present preliminary results developing and evaluating them.

            Content

            Author and article information

            Contributors
            Conference
            July 2016
            July 2016
            : 1-3
            Affiliations
            [0001]Bournemouth University

            Poole, UK
            [0002]Athens University of Economics & Business

            Athens, Greece
            Article
            10.14236/ewic/HCI2016.93
            9ea402c5-5d3c-460c-80f5-b3f923cb24a5
            © Faily et al. Published by BCS Learning and Development Ltd. Proceedings of British HCI 2016 Conference Fusion, Bournemouth, UK

            This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

            Proceedings of the 30th International BCS Human Computer Interaction Conference
            HCI
            30
            Bournemouth University, Poole, UK
            11 - 15 July 2016
            Electronic Workshops in Computing (eWiC)
            Fusion
            History
            Product

            1477-9358 BCS Learning & Development

            Self URI (article page): https://www.scienceopen.com/hosted-document?doi=10.14236/ewic/HCI2016.93
            Self URI (journal page): https://ewic.bcs.org/
            Categories
            Electronic Workshops in Computing

            Applied computer science,Computer science,Security & Cryptology,Graphics & Multimedia design,General computer science,Human-computer-interaction
            Personas,Critical Infrastructure,Specification Exemplars,Tasks,Risks,CAIRIS,Water,Rail

            REFERENCES

            1. BANCIS Project Team 2016a ACME Water Specification Exemplar. https://github.com/failys/cairis/tree/master/examples/exemplars/ACME_Water

            2. BANCIS Project Team 2016b Balkan Rail Specification Exemplar https://github.com/failys/cairis/tree/master/examples/exemplars/Balkan_Rail

            3. 2016 A serious game for eliciting social engineering security requirements. Proceedings of the 24th IEEE International Conference on Requirements Engineering, RE ’16. IEEE Computer Society. To Appear

            4. 1999 The Inmates Are Running the Asylum: Why High Tech Products Drive Us Crazy and How to Restore the Sanity 2 Pearson Higher Education

            5. 2015 CAIRIS web site http://cairis.org

            6. 2010 A Meta-Model for Usable Secure Requirements Engineering Proceedings of the 6th International Workshop on Software Engineering for Secure Systems 126 135 IEEE Computer Society

            7. 2010 Barry is not the weakest link: eliciting secure system requirements with personas Proceedings of the 24th BCS Interaction Specialist Group Conference 124 132 British Computer Society

            8. 2011 User-centered information security policy development in a post-stuxnet world. Proceedings of the 6th International Conference on Availability, Reliability and Security 716 721

            9. 2015 “Water, Water, Every Where”: Nuances for a Water Industry Critical Infrastructure Specification Exemplar Proceedings of the 10th International Conference on Critical Information Infrastructures Security Springer. To Appear

            10. 1997 Requirements and specification exemplars. Automated Software Engineering 4 4 419 438

            11. 2003 Bringing security home: a process for developing secure and usable systems. Proceedings of the 2003 New Security Paradigms Workshop 49 57 ACM

            12. 2009 Requirements Engineering: from system goals to UML models to software specifications John Wiley & Sons

            Comments

            Comment on this article