19
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: not found
      • Article: not found

      Engaging stakeholders during late stage security design with assumption personas

       
      Information and Computer Security
      Emerald

      Read this article at

      ScienceOpenPublisher
      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Most cited references6

          • Record: found
          • Abstract: not found
          • Article: not found

          Handling obstacles in goal-oriented requirements engineering

            Bookmark
            • Record: found
            • Abstract: not found
            • Conference Proceedings: not found

            A meta-model for usable secure requirements engineering

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Integrating security and usability into the requirements and design process

                Bookmark

                Author and article information

                Journal
                Information and Computer Security
                Info and Computer Security
                Emerald
                2056-4961
                October 12 2015
                October 12 2015
                : 23
                : 4
                : 435-446
                Article
                10.1108/ICS-10-2014-0066
                fa8311e7-da8e-42a3-a869-647f4d0356cb
                © 2015

                http://www.emeraldinsight.com/page/tdm

                History

                Comments

                Comment on this article