-
1
-
-
85072399633
-
-
web site
-
CAIRIS web site. http://www.comlab.ox.ac.uk/cairis.
-
-
-
-
3
-
-
77954608445
-
Negative scenarios and misuse cases
-
I. F. Alexander and N. Maiden, Eds. John Wiley & Sons Ltd
-
Alexander, I. Negative scenarios and misuse cases. In Scenarios, Stories, Use Cases: Through the Systems Development Life-Cycle, I. F. Alexander and N. Maiden, Eds. John Wiley & Sons Ltd, 2004.
-
(2004)
Scenarios, Stories, Use Cases: Through the Systems Development Life-Cycle
-
-
Alexander, I.1
-
5
-
-
0002437413
-
Investigating information systems with action research
-
Baskerville, R. L. Investigating information systems with action research. Commun. AIS (1999), 4.
-
(1999)
Commun. AIS
, pp. 4
-
-
Baskerville, R.L.1
-
6
-
-
0003472565
-
-
Morgan Kaufmann Publishers Inc., San Francisco, CA, USA
-
Beyer, H., and Holtzblatt, K. Contextual design: defining customer-centered systems. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 1998.
-
(1998)
Contextual Design: Defining Customer-Centered Systems
-
-
Beyer, H.1
Holtzblatt, K.2
-
7
-
-
77953896837
-
Personas in action: Ethnography in an interaction design team
-
New York, NY, USA, ACM
-
Blomquist, A., and Arvola, M. Personas in action: ethnography in an interaction design team. In NordiCHI’02: Proceedings of the second Nordic conference on Human-computer interaction (New York, NY, USA, 2002), ACM, pp. 197–200.
-
(2002)
NordiCHI’02: Proceedings of the Second Nordic Conference on Human-Computer Interaction
, pp. 197-200
-
-
Blomquist, A.1
Arvola, M.2
-
8
-
-
56849103939
-
Integrating the personas technique into the requirements analysis activity
-
Oct
-
Castro, J., Acua, S., and Juristo, N. Integrating the personas technique into the requirements analysis activity. In Computer Science, 2008. ENC’08. Mexican International Conference on (Oct. 2008), pp. 104–112.
-
(2008)
Computer Science, 2008. ENC’08. Mexican International Conference on
, pp. 104-112
-
-
Castro, J.1
Acua, S.2
Juristo, N.3
-
9
-
-
57049132845
-
Revisiting usability’s three key principles
-
New York, NY, USA, ACM
-
Cockton, G. Revisiting usability’s three key principles. In CHI’08: CHI’08 extended abstracts on Human factors in computing systems (New York, NY, USA, 2008), ACM, pp. 2473–2484.
-
(2008)
CHI’08: CHI’08 Extended Abstracts on Human Factors in Computing Systems
, pp. 2473-2484
-
-
Cockton, G.1
-
12
-
-
0037941821
-
-
Sage Publications, Inc
-
Corbin, J. M., and Strauss, A. L. Basics of qualitative research: techniques and procedures for developing grounded theory, 3rd ed. Sage Publications, Inc., 2008.
-
(2008)
Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory, 3rd Ed
-
-
Corbin, J.M.1
Strauss, A.L.2
-
13
-
-
38349123642
-
A goal oriented approach for modeling and analyzing security trade-offs
-
Elahi, G., and Yu, E. A goal oriented approach for modeling and analyzing security trade-offs, vol. 4801 LNCS. 2007.
-
(2007)
LNCS
, vol.4801
-
-
Elahi, G.1
Yu, E.2
-
14
-
-
77954570579
-
A meta-model for usable secure requirements engineering
-
May IEEE Computer Society Press
-
Faily, S., and Fléchais, I. A Meta-Model for Usable Secure Requirements Engineering. In Software Engineering for Secure Systems, 2010. SESS’10. ICSE Workshop on (May 2010), IEEE Computer Society Press, pp. 126–135.
-
(2010)
Software Engineering for Secure Systems, 2010. SESS’10. ICSE Workshop on
, pp. 126-135
-
-
Faily, S.1
Fléchais, I.2
-
16
-
-
78650342684
-
Towards tool-support for usable secure requirements engineering with CAIRIS
-
IGI Global. To Appear
-
Faily, S., and Fléchais, I. Towards tool-support for Usable Secure Requirements Engineering with CAIRIS. In International Journal of Secure Software Engineering (2010), IGI Global. To Appear.
-
(2010)
International Journal of Secure Software Engineering
-
-
Faily, S.1
Fléchais, I.2
-
17
-
-
0022038089
-
Designing for usability: Key principles and what designers think
-
Gould, J. D., and Lewis, C. Designing for usability: key principles and what designers think. Communications of the ACM 28, 3 (1985), 300–311.
-
(1985)
Communications of the ACM
, vol.28
, Issue.3
, pp. 300-311
-
-
Gould, J.D.1
Lewis, C.2
-
18
-
-
85052770585
-
Contextual inquiry: A participatory technique for systems design
-
D. Schuler and A. Namioka, Eds. Lawrence Erlbaum Associates
-
Holtzblatt, K., and Jones, S. Contextual inquiry: a participatory technique for systems design. In Participatory Design: Principles and Practice, D. Schuler and A. Namioka, Eds. Lawrence Erlbaum Associates, 1993, pp. 177–210.
-
(1993)
Participatory Design: Principles and Practice
, pp. 177-210
-
-
Holtzblatt, K.1
Jones, S.2
-
20
-
-
70350216179
-
Integrating human-computer interaction artifacts into system development
-
Springer
-
Moundalexis, M., Deery, J., and Roberts, K. Integrating human-computer interaction artifacts into system development, vol. 5619 LNCS. Springer, 2009.
-
(2009)
LNCS
, vol.5619
-
-
Moundalexis, M.1
Deery, J.2
Roberts, K.3
-
21
-
-
33744458821
-
-
ATLAS.ti Scientific Software Development GmbH, Berlin
-
Muhr, T. User’s Manual for ATLAS.ti 5.0. ATLAS.ti Scientific Software Development GmbH, Berlin, 2004.
-
(2004)
User’s Manual for ATLAS.Ti 5.0
-
-
Muhr, T.1
-
24
-
-
0016555241
-
The protection of information in computer systems
-
Sept
-
Saltzer, J., and Schroeder, M. The protection of information in computer systems. Proceedings of the IEEE 63, 9 (Sept. 1975), 1278–1308.
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.1
Schroeder, M.2
-
26
-
-
36249010910
-
Lessons learned from the maroochy water breach
-
E. Goetz and S. Shenoi, Eds.,. Springet
-
Slay, J., and Miller, M. Lessons learned from the maroochy water breach. In Critical Infrastructure Protection. IFIP WG 11.10 series in critical infrastructure protection, E. Goetz and S. Shenoi, Eds., vol. 253. Springet, 2007, pp. 73–82.
-
(2007)
Critical Infrastructure Protection. IFIP WG 11.10 Series in Critical Infrastructure Protection
, vol.253
, pp. 73-82
-
-
Slay, J.1
Miller, M.2
-
27
-
-
62749103330
-
Adversary centered design: Threat modeling using anti-scenarios, anti-use cases and anti-personas
-
H. R. Arabnia and R. R. Hashemi, Eds., CSREA Press
-
Steele, A., and Jie, X. Adversary Centered Design: Threat Modeling Using Anti-Scenarios, Anti-Use Cases and Anti-Personas. In Proceedings of the 2008 International Conference on Information & Knowledge Engineering, IKE 2008 (2008), H. R. Arabnia and R. R. Hashemi, Eds., CSREA Press, pp. 367–370.
-
(2008)
Proceedings of the 2008 International Conference on Information & Knowledge Engineering, IKE 2008
, pp. 367-370
-
-
Steele, A.1
Jie, X.2
-
29
-
-
0034291619
-
Handling obstacles in goal-oriented requirements engineering
-
van Lamsweerde, A., and Letier, E. Handling obstacles in goal-oriented requirements engineering. Software Engineering, IEEE Transactions on 26, 10 (2000), 978–1005.
-
(2000)
Software Engineering, IEEE Transactions on
, vol.26
, Issue.10
, pp. 978-1005
-
-
van Lamsweerde, A.1
Letier, E.2
-
30
-
-
85084161247
-
Why johnny can’t encrypt: A usability evaluation of PGP 5.0
-
Berkeley, CA, USA, USENIX Association
-
Whitten, A., and Tygar, J. D. Why Johnny can’t encrypt: a usability evaluation of PGP 5.0. In SSYM’99: Proceedings of the 8th conference on USENIX Security Symposium (Berkeley, CA, USA, 1999), USENIX Association, pp. 14–14.
-
(1999)
SSYM’99: Proceedings of the 8th Conference on USENIX Security Symposium
, pp. 14
-
-
Whitten, A.1
Tygar, J.D.2
|