When used in requirements processes and tools, personas have the potential to identify vulnerabilities resulting from misalignment between user expectations and system goals. Typically, however, this potential is unfulfilled as personas and system goals are captured with different mindsets, by different teams, and for different purposes. If personas are visualised as goal models, it may be easier for stakeholders to see implications of their goals being satisfied or denied, and designers to incorporate the creation and analysis of such models into the broader RE tool-chain. This paper outlines a tool-supported approach for finding implicit vulnerabilities from user and system goals by reframing personas as social goal models. We il...
The adversarial element is an intrinsic part of the design of secure systems, but our assumptions ab...
Building secure and usable systems means specifying systems for the people using it and the tasks th...
This paper aims to present an approach where assumption personas are used to engage stakeholders in ...
When used in requirements processes and tools, personas have the potential to identify vulnerabiliti...
This paper aims to present a tool-supported approach for visualising personas as social goal models,...
Despite the large body of i* research, there has been com- paratively little work on how goal-modell...
Personas are useful for obtaining an empirically grounded understanding of a secure system's user po...
Developers and users rely on trust to simplify complexity when building and using software. Unfortun...
Developers and users rely on trust to simplify complexity when building and using software. Unfortu...
Building secure and usable systems means specifying systems for the people using it and the tasks th...
System stakeholders fail to engage with security until comparatively late in the design and developm...
System stakeholders fail to engage with security until comparatively late in the design and developm...
Abstract The development of security visualization applications must involve the user in the design ...
Personas are a common tool used in Human Computer Interaction to represent the needs and expectation...
The adversarial element is an intrinsic part of the design of secure systems, but our assumptions ab...
Building secure and usable systems means specifying systems for the people using it and the tasks th...
This paper aims to present an approach where assumption personas are used to engage stakeholders in ...
When used in requirements processes and tools, personas have the potential to identify vulnerabiliti...
This paper aims to present a tool-supported approach for visualising personas as social goal models,...
Despite the large body of i* research, there has been com- paratively little work on how goal-modell...
Personas are useful for obtaining an empirically grounded understanding of a secure system's user po...
Developers and users rely on trust to simplify complexity when building and using software. Unfortun...
Developers and users rely on trust to simplify complexity when building and using software. Unfortu...
Building secure and usable systems means specifying systems for the people using it and the tasks th...
System stakeholders fail to engage with security until comparatively late in the design and developm...
System stakeholders fail to engage with security until comparatively late in the design and developm...
Abstract The development of security visualization applications must involve the user in the design ...
Personas are a common tool used in Human Computer Interaction to represent the needs and expectation...
The adversarial element is an intrinsic part of the design of secure systems, but our assumptions ab...
Building secure and usable systems means specifying systems for the people using it and the tasks th...
This paper aims to present an approach where assumption personas are used to engage stakeholders in ...