Barry is not the weakest link: Eliciting Secure System Requirements with Personas
Main Authors: | , |
---|---|
Format: | Conference item |
Published: |
British Computer Society
2010
|
_version_ | 1826294348631769088 |
---|---|
author | Faily, S Flechais, I |
author_facet | Faily, S Flechais, I |
author_sort | Faily, S |
collection | OXFORD |
description | |
first_indexed | 2024-03-07T03:44:15Z |
format | Conference item |
id | oxford-uuid:beea4df3-ab7b-42e2-ae8e-4e247cad3bb4 |
institution | University of Oxford |
last_indexed | 2024-03-07T03:44:15Z |
publishDate | 2010 |
publisher | British Computer Society |
record_format | dspace |
spelling | oxford-uuid:beea4df3-ab7b-42e2-ae8e-4e247cad3bb42022-03-27T05:43:30ZBarry is not the weakest link: Eliciting Secure System Requirements with PersonasConference itemhttp://purl.org/coar/resource_type/c_5794uuid:beea4df3-ab7b-42e2-ae8e-4e247cad3bb4Department of Computer ScienceBritish Computer Society2010Faily, SFlechais, I |
spellingShingle | Faily, S Flechais, I Barry is not the weakest link: Eliciting Secure System Requirements with Personas |
title | Barry is not the weakest link: Eliciting Secure System Requirements with Personas |
title_full | Barry is not the weakest link: Eliciting Secure System Requirements with Personas |
title_fullStr | Barry is not the weakest link: Eliciting Secure System Requirements with Personas |
title_full_unstemmed | Barry is not the weakest link: Eliciting Secure System Requirements with Personas |
title_short | Barry is not the weakest link: Eliciting Secure System Requirements with Personas |
title_sort | barry is not the weakest link eliciting secure system requirements with personas |
work_keys_str_mv | AT failys barryisnottheweakestlinkelicitingsecuresystemrequirementswithpersonas AT flechaisi barryisnottheweakestlinkelicitingsecuresystemrequirementswithpersonas |