1,106
views
0
recommends
+1 Recommend
1 collections
    8
    shares

      Celebrating 65 years of The Computer Journal - free-to-read perspectives - bcs.org/tcj65

      scite_
       
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      The Application of useless Japanese Inventions for Requirements Elicitation in Information Security

      proceedings-article
      ,  
      Proceedings of the 30th International BCS Human Computer Interaction Conference (HCI)
      Fusion
      11 - 15 July 2016
      Information Security, Requirements Engineering, Creativity, Requirements Elicitation
      Bookmark

            Abstract

            Rules of requirements elicitation in security are broken through the use of Chindōgu, by designing impractical security countermeasures in the first instance, then using these to create usable security requirements. We present a process to conceive the requirements in Chindōgu form. We evaluate the usefulness of this process by applying it in three workshops with data gathered from a European rail company, and comparing requirements elicited by this process with a set of control requirements.

            Content

            Author and article information

            Contributors
            Conference
            July 2016
            July 2016
            : 1-3
            Affiliations
            [0001]Bournemouth University, Poole, UK
            Article
            10.14236/ewic/HCI2016.102
            9767ba85-7cc3-4633-9c38-5a77ea1827f4
            © Partridge et al. Published by BCS Learning and Development Ltd. Proceedings of British HCI 2016 Conference Fusion, Bournemouth, UK

            This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

            Proceedings of the 30th International BCS Human Computer Interaction Conference
            HCI
            30
            Bournemouth University, Poole, UK
            11 - 15 July 2016
            Electronic Workshops in Computing (eWiC)
            Fusion
            History
            Product

            1477-9358 BCS Learning & Development

            Self URI (article page): https://www.scienceopen.com/hosted-document?doi=10.14236/ewic/HCI2016.102
            Self URI (journal page): https://ewic.bcs.org/
            Categories
            Electronic Workshops in Computing

            Applied computer science,Computer science,Security & Cryptology,Graphics & Multimedia design,General computer science,Human-computer-interaction
            Information Security,Requirements Engineering,Creativity,Requirements Elicitation

            REFERENCES

            1. 2012 Analysing chindogu: Applying defamiliarisation to security design. CHI 2012 Workshop on Defamiliarisation in Innovation and Usability

            2. 2016 Human-Centered Specification Exemplars for Critical Infrastructure Environments. In Proceedings of the 30th British HCI Group Annual Conference on People and Computers To Appear

            3. 2004 Provoking creativity: imagine what your requirements could be like. IEEE Software 21 5 68 75

            4. 2008 Chindogu: The Art Of The Unuseless. http://www.curiosite.com/scripts/news/ennews.php?frmIdPagina=10077

            5. 2009 Volere Requirements Specification Template: Edition 14 - January 2009. http://www.volere.co.uk/template.htm

            6. 2015 Chindogu: Only in Japan will these things exist.... http://www.theculturemap.com/chindogu-only-in-japan-things-exist/

            Comments

            Comment on this article