774
views
0
recommends
+1 Recommend
1 collections
    5
    shares
       
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      Building Attacker Personas in Practice — a Digital Banking Example

      proceedings-article

      Proceedings of the 32nd International BCS Human Computer Interaction Conference (HCI)

      Human Computer Interaction Conference

      4 - 6 July 2018

      Personas/attacker personas, Information security, Digital banking, User-/adversary-centred design

      Bookmark

            Content

            Author and article information

            Contributors
            Conference
            July 2018
            July 2018
            : 1-5
            Affiliations
            Royal Holloway, University of London

            Egham Hill, Egham TW20 0EX, UK
            Article
            10.14236/ewic/HCI2018.147
            3b149b00-1bca-4242-acae-28d4c3de3cc0
            © Moeckel. Published by BCS Learning and Development Ltd. Proceedings of British HCI 2018. Belfast, UK.

            This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

            Proceedings of the 32nd International BCS Human Computer Interaction Conference
            HCI
            32
            Belfast, UK
            4 - 6 July 2018
            Electronic Workshops in Computing (eWiC)
            Human Computer Interaction Conference
            Product
            Product Information: 1477-9358BCS Learning & Development
            Self URI (journal page): https://ewic.bcs.org/
            Categories
            Electronic Workshops in Computing

            References

            1. 2010 The essential persona lifecycle: your guide to building and using personas. Elsevier

            2. 2011
              Here’s Johnny: a methodology for developing attacker personas 2011 Sixth International Conference on Availability, Reliability & Security
              Vienna
              2011
              722 727

            3. 1997 Scenarios as springboard in CSCW design (Eds.) Social science, technical systems and cooperative work 217 234 London Lawrence Erlbaum

            4. BCS - British Computer Society 2014 Cybercrime Forensics Specialist Group Briefings. Compiled by Denis Edgar-Nevill (Canterbury Christ Church University), available via group distribution list 2010 2014

            5. CCCD - Cambridge Computer Crime Database - Hutchings A 2018 http://www.cl.cam.ac.uk/~ah793/cccd.html (16 April 2018)

            6. 2000 Making Use: scenario-based design of human-computer interactions Cambridge, Mass MIT Press

            7. 2009 Profiling Hackers CRC Press, Taylor & Francis

            8. 1999 The inmates are running the asylum SAMS

            9. 2007 About Face 3.0: The essentials of interaction design Wiley

            10. FBI - Federal Bureau Investigation 2018 Cyber’s Most Wanted http://www.fbi.gov/wanted/cyber (16 April 2018)

            11. Images Getty – iStock database 2018 Source for attacker persona images – IDs for purchased images: 82011555, 247519731, 249380561, 125323949, 125705417, 117226075, 249461806, 249461806 http://www.istockphoto.com (16 April 2018)

            12. 2009 Designing for the digital age: how to create human-centred products and services Wiley

            13. 2002 Personas, participatory design and product development: An infrastructure for engagement PDA

            14. Times Gulf 2014 80 detained in global cyber-crime takedown http://www.gulf-times.com/story/392708/80-detained-in-global-cyber-crime-takedown (16 April 2018)

            15. 2017 Persona-centred information security awareness Computers & Security 70 Sept. 2017 663 674 Elsevier

            16. 2007 10 steps to personas http://personas.dk/wp-content/LOWRES-Personas-english-version-oktober-200821.pdf (16 April 2018)

            17. 2013 Personas - user focused design Springer

            18. 2014 Threat modelling: designing for security John Wiley & Sons

            19. 2008 Adversary-centred design: threat modelling using anti-scenarios, anti-use cases and anti-personas International Conference on Information and Knowledge Engineering (IKE 2008)

              Las Vegas, Nevada, USA
              July 14-17, 2008
              CSREA Press

            Comments

            Comment on this article