ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
33
views
0
references
Top references
cited by
4
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,116
similar
All similar
Record
: found
Abstract
: not found
Conference Proceedings
: not found
A Serious Game for Eliciting Social Engineering Security Requirements
proceedings-article
Author(s):
Kristian Beckers
,
Sebastian Pape
Publication date
(Print):
September 2016
Publisher:
IEEE
Conference name:
2016 IEEE 24th International Requirements Engineering Conference (RE)
Conference date:
October 12, 2016 - October 16, 2016
Read this article at
ScienceOpen
Publisher
Further versions
oa repository (via OAI-PMH title and first author match)
oa repository (via OAI-PMH title and first author match)
Powered by
Review
Review article
Invite someone to review
Bookmark
Cite as...
There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
The Criminology, Victimology and Security Journal
Author and article information
Conference
Publisher:
IEEE
Publication date:
September 2016
Publication date (Print):
September 2016
Pages
: 16-25
Article
DOI:
10.1109/RE.2016.39
SO-VID:
39292de4-b5ec-4876-86f9-513586689d98
Copyright ©
© 2016
Conference name:
2016 IEEE 24th International Requirements Engineering Conference (RE)
Conference location:
Beijing, China
Conference date:
October 12, 2016 - October 16, 2016
History
Data availability:
Comments
Comment on this article
Sign in to comment
scite_
Similar content
2,116
Industrial case studies in graduate requirements engineering courses: The impact on student motivation
Authors:
Marian Daun
,
Andrea Salmon
,
Bastian Tenbergen
…
A Formal Security Requirements Model for a Grid-based Operating System
Authors:
Benjamin Aziz
,
Alvaro Arenas
,
Juan Bicarregui
…
Security-Based Mechanism for Proactive Routing Schema Using Game Theory Model
Authors:
Ahmed Habbani
,
Essaid Bilal
,
Abdelmajid Hajami
…
See all similar
Cited by
2
Social Engineering Attacks: A Survey
Authors:
Fatima Salahdine
,
Naima Kaabouch
Human-Centered Specification Exemplars for Critical Infrastructure Environments
Authors:
Shamal Faily
,
Georgia Lykou
,
Anton Partridge
…
See all cited by