Barry is not the weakest link: Eliciting Secure System Requirements with Personas
Principais autores: | , |
---|---|
Formato: | Conference item |
Publicado em: |
British Computer Society
2010
|
Resumo: |
---|
Principais autores: | , |
---|---|
Formato: | Conference item |
Publicado em: |
British Computer Society
2010
|
Resumo: |
---|