Personas are a common tool used in Human Computer Interaction to represent the needs and expectations of a system’s stakeholders, but they are also grounded in large amounts of qualitative data. Our aim is to make use of this data to anticipate the differences between a user persona’s expectations of a system, and the expectations held by its developers. This paper introduces the idea of gulfs of expectation – the gap between the expectations held by a user about a system and its developers, and the expectations held by a developer about the system and its users. By evaluating these differences in expectation against a formal representation of a system, we demonstrate how differences between the anticipated user and developer mental models ...
Abstract. Personas are useful for considering how users of a system might behave, but problematic wh...
Building secure and usable systems means specifying systems for the people using it and the tasks th...
System stakeholders fail to engage with security until comparatively late in the design and developm...
Personas are a common tool used in Human Computer Interaction to represent the needs and expectation...
Personas are a common tool used in Human Computer Interaction to represent the needs and expectation...
Developers and users rely on trust to simplify complexity when building and using software. Unfortun...
Developers and users rely on trust to simplify complexity when building and using software. Unfortun...
Abstract. Personas are useful for obtaining an empirically grounded understanding of a secure system...
Personas are useful for considering how users of a system might behave, but problematic when account...
While the information systems (IS) community has examined the role of interpersonal trust in e-comme...
Personas are useful for obtaining an empirically grounded understanding of a secure system's user po...
Personas are behavioural specifications of archetypical users in Human Factors Engineering and User ...
Personas are behavioural specifications of archetypical users in Human Factors Engineering and User ...
This study examines perceptions of human trustworthiness as a key component in countering insider t...
peer reviewedThe set of impressions that a user has about distinct aspects of a system depends on th...
Abstract. Personas are useful for considering how users of a system might behave, but problematic wh...
Building secure and usable systems means specifying systems for the people using it and the tasks th...
System stakeholders fail to engage with security until comparatively late in the design and developm...
Personas are a common tool used in Human Computer Interaction to represent the needs and expectation...
Personas are a common tool used in Human Computer Interaction to represent the needs and expectation...
Developers and users rely on trust to simplify complexity when building and using software. Unfortun...
Developers and users rely on trust to simplify complexity when building and using software. Unfortun...
Abstract. Personas are useful for obtaining an empirically grounded understanding of a secure system...
Personas are useful for considering how users of a system might behave, but problematic when account...
While the information systems (IS) community has examined the role of interpersonal trust in e-comme...
Personas are useful for obtaining an empirically grounded understanding of a secure system's user po...
Personas are behavioural specifications of archetypical users in Human Factors Engineering and User ...
Personas are behavioural specifications of archetypical users in Human Factors Engineering and User ...
This study examines perceptions of human trustworthiness as a key component in countering insider t...
peer reviewedThe set of impressions that a user has about distinct aspects of a system depends on th...
Abstract. Personas are useful for considering how users of a system might behave, but problematic wh...
Building secure and usable systems means specifying systems for the people using it and the tasks th...
System stakeholders fail to engage with security until comparatively late in the design and developm...