Barry is not the weakest link: Eliciting Secure System Requirements with Personas
Main Authors: | , |
---|---|
Formato: | Conference item |
Publicado: |
British Computer Society
2010
|
Summary: |
---|
Main Authors: | , |
---|---|
Formato: | Conference item |
Publicado: |
British Computer Society
2010
|
Summary: |
---|