Barry is not the weakest link: Eliciting Secure System Requirements with Personas
Main Authors: | , |
---|---|
Formato: | Conference item |
Publicado em: |
British Computer Society
2010
|
Resumo: |
---|
Main Authors: | , |
---|---|
Formato: | Conference item |
Publicado em: |
British Computer Society
2010
|
Resumo: |
---|