265
views
0
recommends
+1 Recommend
1 collections
    8
    shares
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      The Application of useless Japanese Inventions for Requirements Elicitation in Information Security

      ,  

      Proceedings of the 30th International BCS Human Computer Interaction Conference (HCI)

      Fusion

      11 - 15 July 2016

      Information Security, Requirements Engineering, Creativity, Requirements Elicitation

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Rules of requirements elicitation in security are broken through the use of Chindōgu, by designing impractical security countermeasures in the first instance, then using these to create usable security requirements. We present a process to conceive the requirements in Chindōgu form. We evaluate the usefulness of this process by applying it in three workshops with data gathered from a European rail company, and comparing requirements elicited by this process with a set of control requirements.

          Related collections

          Most cited references 7

          • Record: found
          • Abstract: not found
          • Article: not found

          Provoking Creativity: Imagine What Your Requirements Could Be Like

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Chindogu: The Art Of The Unuseless.

             A. Mediavilla (2008)
              Bookmark
              • Record: found
              • Abstract: found
              • Conference Proceedings: found
              Is Open Access

              Human-Centered Specification Exemplars for Critical Infrastructure Environments

              Specification models of critical infrastructure focus on parts of a larger environment. However, to consider the security of critical infrastructure systems, we need approaches for modelling the sum of these parts; these include people and activities, as well as technology. This paper present human-centered specification exemplars that capture the nuances associated with interactions between people, technology, and critical infrastructure environments. We describe requirements each exemplar needs to satisfy, and present preliminary results developing and evaluating them.
                Bookmark

                Author and article information

                Contributors
                Conference
                July 2016
                July 2016
                : 1-3
                Affiliations
                Bournemouth University, Poole, UK
                Article
                10.14236/ewic/HCI2016.102
                © Partridge et al. Published by BCS Learning and Development Ltd. Proceedings of British HCI 2016 Conference Fusion, Bournemouth, UK

                This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

                Proceedings of the 30th International BCS Human Computer Interaction Conference
                HCI
                30
                Bournemouth University, Poole, UK
                11 - 15 July 2016
                Electronic Workshops in Computing (eWiC)
                Fusion
                Product
                Product Information: 1477-9358BCS Learning & Development
                Self URI (journal page): https://ewic.bcs.org/
                Categories
                Electronic Workshops in Computing

                Comments

                Comment on this article