Barry is not the weakest link: Eliciting Secure System Requirements with Personas
Váldodahkkit: | Faily, S, Flechais, I |
---|---|
Materiálatiipa: | Conference item |
Almmustuhtton: |
British Computer Society
2010
|
Geahča maid
-
Eliciting Usable Security Requirements with Misusability Cases
Dahkki: Faily, S, et al.
Almmustuhtton: (2011) -
Gulfs of expectation: eliciting and verifying differences in trust expectations using personas
Dahkki: Faily, S, et al.
Almmustuhtton: (2016) -
The Secret Lives of Assumptions: Developing and Refining Assumption Personas for Secure System Design
Dahkki: Faily, S, et al.
Almmustuhtton: (2010) -
Eliciting Policy Requirements for Critical National Infrastructure using the IRIS Framework
Dahkki: Faily, S, et al.
Almmustuhtton: (2011) -
Eliciting Policy Requirements for Critical National Infrastructure Using the IRIS Framework.
Dahkki: Faily, S, et al.
Almmustuhtton: (2011)