1,086
views
0
recommends
+1 Recommend
1 collections
    0
    shares

      Celebrating 65 years of The Computer Journal - free-to-read perspectives - bcs.org/tcj65

      scite_
       
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      Barry is not the weakest link: Eliciting Secure System Requirements with Personas

      proceedings-article
        ,
      Proceedings of HCI 2010 (HCI)
      Human Computer Interaction
      6 - 10 September 2010
      Bookmark

            Abstract

            Building secure and usable systems means specifying systems for the people using it and the tasks they carry out, rather than vice-versa. User-Centered design approaches encourage an early focus on users and their contexts of use, but these need to be integrated with approaches for engineering secure systems. This paper describes how personas can augment a process for eliciting and specifying requirements for secure and usable systems. Our results suggest that personas increase stakeholder empathy towards users represented by personas, and the empirical data used to build personas can also be used to obtain a better understanding of prospective attackers and their motivations.

            Content

            Author and article information

            Contributors
            Conference
            September 2010
            September 2010
            : 124-132
            Affiliations
            [0001]Oxford University Computing Laboratory

            Wolfson Building Oxford OX1 3QD, UK
            Article
            10.14236/ewic/HCI2010.17
            534e4302-77e4-4eea-8340-e5865bd22d58
            © Shamal Faily et al. Published by BCS Learning and Development Ltd. Proceedings of HCI 2010, University of Abertay, Dundee, UK

            This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

            Proceedings of HCI 2010
            HCI
            24
            University of Abertay, Dundee, UK
            6 - 10 September 2010
            Electronic Workshops in Computing (eWiC)
            Human Computer Interaction
            History
            Product

            1477-9358 BCS Learning & Development

            Self URI (article page): https://www.scienceopen.com/hosted-document?doi=10.14236/ewic/HCI2010.17
            Self URI (journal page): https://ewic.bcs.org/
            Categories
            Electronic Workshops in Computing

            Applied computer science,Computer science,Security & Cryptology,Graphics & Multimedia design,General computer science,Human-computer-interaction

            Comments

            Comment on this article