Barry is not the weakest link: Eliciting Secure System Requirements with Personas
Main Authors: | , |
---|---|
Format: | Conference item |
Published: |
British Computer Society
2010
|
Main Authors: | , |
---|---|
Format: | Conference item |
Published: |
British Computer Society
2010
|