Designing for usability: key principles and what designers think
Communications of the ACM
Communications of the ACM
Handling Obstacles in Goal-Oriented Requirements Engineering
IEEE Transactions on Software Engineering - special section on current trends in exception handling—part II
Investigating information systems with action research
Communications of the AIS
Secrets & Lies: Digital Security in a Networked World
Secrets & Lies: Digital Security in a Networked World
Contextual Design: Defining Customer-Centered Systems
Contextual Design: Defining Customer-Centered Systems
Personas in action: ethnography in an interaction design team
Proceedings of the second Nordic conference on Human-computer interaction
Modelling strategic relationships for process reengineering
Modelling strategic relationships for process reengineering
The Inmates Are Running the Asylum: Why High Tech Products Drive Us Crazy and How to Restore the Sanity (2nd Edition)
The Persona Lifecycle: Keeping People in Mind Throughout Product Design
The Persona Lifecycle: Keeping People in Mind Throughout Product Design
Requirements Engineering
Testing Code Security
Why Johnny can't encrypt: a usability evaluation of PGP 5.0
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Revisiting usability's three key principles
CHI '08 Extended Abstracts on Human Factors in Computing Systems
About face 3: the essentials of interaction design
About face 3: the essentials of interaction design
Integrating the Personas Technique into the Requirements Analysis Activity
ENC '08 Proceedings of the 2008 Mexican International Conference on Computer Science
Integrating Human-Computer Interaction Artifacts into System Development
HCD 09 Proceedings of the 1st International Conference on Human Centered Design: Held as Part of HCI International 2009
A goal oriented approach for modeling and analyzing security trade-offs
ER'07 Proceedings of the 26th international conference on Conceptual modeling
A meta-model for usable secure requirements engineering
Proceedings of the 2010 ICSE Workshop on Software Engineering for Secure Systems
Towards Tool-Support for Usable Secure Requirements Engineering with CAIRIS
International Journal of Secure Software Engineering
HCSE'10 Proceedings of the Third international conference on Human-centred software engineering
Persona cases: a technique for grounding personas
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Eliciting Policy Requirements for Critical National Infrastructure Using the IRIS Framework
International Journal of Secure Software Engineering
Hi-index | 0.00 |
Building secure and usable systems means specifying systems for the people using it and the tasks they carry out, rather than vice-versa. User-Centered design approaches encourage an early focus on users and their contexts of use, but these need to be integrated with approaches for engineering secure systems. This paper describes how personas can augment a process for eliciting and specifying requirements for secure and usable systems. Our results suggest that personas increase stakeholder empathy towards users represented by personas, and the empirical data used to build personas can also be used to obtain a better understanding of prospective attackers and their motivations.