메뉴 건너뛰기




Volumn , Issue , 2010, Pages 124-132

Barry is not the weakest link: Eliciting secure system requirements with personas

Author keywords

[No Author keywords available]

Indexed keywords

EMPIRICAL DATA; SECURE SYSTEM; USER-CENTERED DESIGN APPROACHES; WEAKEST LINKS;

EID: 85028943613     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.14236/ewic/hci2010.17     Document Type: Conference Paper
Times cited : (31)

References (31)
  • 1
    • 85072399633 scopus 로고    scopus 로고
    • web site
    • CAIRIS web site. http://www.comlab.ox.ac.uk/cairis.
  • 5
    • 0002437413 scopus 로고    scopus 로고
    • Investigating information systems with action research
    • Baskerville, R. L. Investigating information systems with action research. Commun. AIS (1999), 4.
    • (1999) Commun. AIS , pp. 4
    • Baskerville, R.L.1
  • 13
    • 38349123642 scopus 로고    scopus 로고
    • A goal oriented approach for modeling and analyzing security trade-offs
    • Elahi, G., and Yu, E. A goal oriented approach for modeling and analyzing security trade-offs, vol. 4801 LNCS. 2007.
    • (2007) LNCS , vol.4801
    • Elahi, G.1    Yu, E.2
  • 16
    • 78650342684 scopus 로고    scopus 로고
    • Towards tool-support for usable secure requirements engineering with CAIRIS
    • IGI Global. To Appear
    • Faily, S., and Fléchais, I. Towards tool-support for Usable Secure Requirements Engineering with CAIRIS. In International Journal of Secure Software Engineering (2010), IGI Global. To Appear.
    • (2010) International Journal of Secure Software Engineering
    • Faily, S.1    Fléchais, I.2
  • 17
    • 0022038089 scopus 로고
    • Designing for usability: Key principles and what designers think
    • Gould, J. D., and Lewis, C. Designing for usability: key principles and what designers think. Communications of the ACM 28, 3 (1985), 300–311.
    • (1985) Communications of the ACM , vol.28 , Issue.3 , pp. 300-311
    • Gould, J.D.1    Lewis, C.2
  • 18
    • 85052770585 scopus 로고
    • Contextual inquiry: A participatory technique for systems design
    • D. Schuler and A. Namioka, Eds. Lawrence Erlbaum Associates
    • Holtzblatt, K., and Jones, S. Contextual inquiry: a participatory technique for systems design. In Participatory Design: Principles and Practice, D. Schuler and A. Namioka, Eds. Lawrence Erlbaum Associates, 1993, pp. 177–210.
    • (1993) Participatory Design: Principles and Practice , pp. 177-210
    • Holtzblatt, K.1    Jones, S.2
  • 20
    • 70350216179 scopus 로고    scopus 로고
    • Integrating human-computer interaction artifacts into system development
    • Springer
    • Moundalexis, M., Deery, J., and Roberts, K. Integrating human-computer interaction artifacts into system development, vol. 5619 LNCS. Springer, 2009.
    • (2009) LNCS , vol.5619
    • Moundalexis, M.1    Deery, J.2    Roberts, K.3
  • 21
    • 33744458821 scopus 로고    scopus 로고
    • ATLAS.ti Scientific Software Development GmbH, Berlin
    • Muhr, T. User’s Manual for ATLAS.ti 5.0. ATLAS.ti Scientific Software Development GmbH, Berlin, 2004.
    • (2004) User’s Manual for ATLAS.Ti 5.0
    • Muhr, T.1
  • 24
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • Sept
    • Saltzer, J., and Schroeder, M. The protection of information in computer systems. Proceedings of the IEEE 63, 9 (Sept. 1975), 1278–1308.
    • (1975) Proceedings of the IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.1    Schroeder, M.2
  • 27
    • 62749103330 scopus 로고    scopus 로고
    • Adversary centered design: Threat modeling using anti-scenarios, anti-use cases and anti-personas
    • H. R. Arabnia and R. R. Hashemi, Eds., CSREA Press
    • Steele, A., and Jie, X. Adversary Centered Design: Threat Modeling Using Anti-Scenarios, Anti-Use Cases and Anti-Personas. In Proceedings of the 2008 International Conference on Information & Knowledge Engineering, IKE 2008 (2008), H. R. Arabnia and R. R. Hashemi, Eds., CSREA Press, pp. 367–370.
    • (2008) Proceedings of the 2008 International Conference on Information & Knowledge Engineering, IKE 2008 , pp. 367-370
    • Steele, A.1    Jie, X.2
  • 29


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.