Handling Obstacles in Goal-Oriented Requirements Engineering
IEEE Transactions on Software Engineering - special section on current trends in exception handling—part II
The Inmates Are Running the Asylum: Why High Tech Products Drive Us Crazy and How to Restore the Sanity (2nd Edition)
The Persona Lifecycle: Keeping People in Mind Throughout Product Design
The Persona Lifecycle: Keeping People in Mind Throughout Product Design
Rationale-Based Software Engineering
Rationale-Based Software Engineering
About face 3: the essentials of interaction design
About face 3: the essentials of interaction design
Integrating the Personas Technique into the Requirements Analysis Activity
ENC '08 Proceedings of the 2008 Mexican International Conference on Computer Science
A meta-model for usable secure requirements engineering
Proceedings of the 2010 ICSE Workshop on Software Engineering for Secure Systems
Barry is not the weakest link: eliciting secure system requirements with personas
BCS '10 Proceedings of the 24th BCS Interaction Specialist Group Conference
Persona cases: a technique for grounding personas
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Basic senior personas: a representative design tool covering the spectrum of European older adults
Proceedings of the 14th international ACM SIGACCESS conference on Computers and accessibility
Requirements sensemaking using concept maps
HCSE'12 Proceedings of the 4th international conference on Human-Centered Software Engineering
Eliciting Policy Requirements for Critical National Infrastructure Using the IRIS Framework
International Journal of Secure Software Engineering
The secret life of a persona: when the personal becomes private
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Hi-index | 0.00 |
Personas are useful for obtaining an empirically grounded understanding of a secure system's user population, its contexts of use, and possible vulnerabilities and threats endangering it. Often, however, personas need to be partly derived from assumptions; these may be embedded in a variety of different representations. Assumption Personas have been proposed as boundary objects for articulating assumptions about a user population, but no methods or tools currently exist for developing and refining these within the context of secure and usable design. This paper presents an approach for developing and refining assumption personas before and during the design of secure systems. We present a model for structuring the contribution of assumptions to assumption personas, together with a process for developing assumption personas founded on this model. We also present some preliminary results based on an application of this approach in a recent case study.