Visualising personas as goal models to find security tensions

<h3>Purpose</h3><p dir="ltr">This paper aims to present a tool-supported approach for visualising personas as social goal models, which can subsequently be used to identify security tensions.</p><h3>Design/methodology/approach</h3><p dir="ltr&quo...

وصف كامل

محفوظ في:
التفاصيل البيبلوغرافية
المؤلف الرئيسي: Shamal Faily (5515142) (author)
مؤلفون آخرون: Claudia Iacob (10344619) (author), Raian Ali (12066006) (author), Duncan Ki-Aries (5515145) (author)
منشور في: 2021
الموضوعات:
الوسوم: إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
_version_ 1864513517744291840
author Shamal Faily (5515142)
author2 Claudia Iacob (10344619)
Raian Ali (12066006)
Duncan Ki-Aries (5515145)
author2_role author
author
author
author_facet Shamal Faily (5515142)
Claudia Iacob (10344619)
Raian Ali (12066006)
Duncan Ki-Aries (5515145)
author_role author
dc.creator.none.fl_str_mv Shamal Faily (5515142)
Claudia Iacob (10344619)
Raian Ali (12066006)
Duncan Ki-Aries (5515145)
dc.date.none.fl_str_mv 2021-08-16T03:00:00Z
dc.identifier.none.fl_str_mv 10.1108/ics-03-2021-0035
dc.relation.none.fl_str_mv https://figshare.com/articles/journal_contribution/Visualising_personas_as_goal_models_to_find_security_tensions/25712316
dc.rights.none.fl_str_mv CC BY 4.0
info:eu-repo/semantics/openAccess
dc.subject.none.fl_str_mv Information and computing sciences
Cybersecurity and privacy
Information systems
personas
goal models
i*
dc.title.none.fl_str_mv Visualising personas as goal models to find security tensions
dc.type.none.fl_str_mv Text
Journal contribution
info:eu-repo/semantics/publishedVersion
text
contribution to journal
description <h3>Purpose</h3><p dir="ltr">This paper aims to present a tool-supported approach for visualising personas as social goal models, which can subsequently be used to identify security tensions.</p><h3>Design/methodology/approach</h3><p dir="ltr">The authors devised an approach to partially automate the construction of social goal models from personas. The authors provide two examples of how this approach can identify previously hidden implicit vulnerabilities and validate ethical hazards faced by penetration testers and their safeguards.</p><h3>Findings</h3><p dir="ltr">Visualising personas as goal models makes it easier for stakeholders to see implications of their goals being satisfied or denied and designers to incorporate the creation and analysis of such models into the broader requirements engineering (RE) tool-chain.</p><h3>Originality/value</h3><p dir="ltr">The approach can be used with minimal changes to existing user experience and goal modelling approaches and security RE tools.</p><h2>Other Information</h2><p dir="ltr">Published in: Information & Computer Security<br>License: <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank">https://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1108/ics-03-2021-0035" target="_blank">https://dx.doi.org/10.1108/ics-03-2021-0035</a></p>
eu_rights_str_mv openAccess
id Manara2_f76a3a3f8dfb2cb94abf2c94d1274f26
identifier_str_mv 10.1108/ics-03-2021-0035
network_acronym_str Manara2
network_name_str Manara2
oai_identifier_str oai:figshare.com:article/25712316
publishDate 2021
repository.mail.fl_str_mv
repository.name.fl_str_mv
repository_id_str
rights_invalid_str_mv CC BY 4.0
spelling Visualising personas as goal models to find security tensionsShamal Faily (5515142)Claudia Iacob (10344619)Raian Ali (12066006)Duncan Ki-Aries (5515145)Information and computing sciencesCybersecurity and privacyInformation systemspersonasgoal modelsi*<h3>Purpose</h3><p dir="ltr">This paper aims to present a tool-supported approach for visualising personas as social goal models, which can subsequently be used to identify security tensions.</p><h3>Design/methodology/approach</h3><p dir="ltr">The authors devised an approach to partially automate the construction of social goal models from personas. The authors provide two examples of how this approach can identify previously hidden implicit vulnerabilities and validate ethical hazards faced by penetration testers and their safeguards.</p><h3>Findings</h3><p dir="ltr">Visualising personas as goal models makes it easier for stakeholders to see implications of their goals being satisfied or denied and designers to incorporate the creation and analysis of such models into the broader requirements engineering (RE) tool-chain.</p><h3>Originality/value</h3><p dir="ltr">The approach can be used with minimal changes to existing user experience and goal modelling approaches and security RE tools.</p><h2>Other Information</h2><p dir="ltr">Published in: Information & Computer Security<br>License: <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank">https://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1108/ics-03-2021-0035" target="_blank">https://dx.doi.org/10.1108/ics-03-2021-0035</a></p>2021-08-16T03:00:00ZTextJournal contributioninfo:eu-repo/semantics/publishedVersiontextcontribution to journal10.1108/ics-03-2021-0035https://figshare.com/articles/journal_contribution/Visualising_personas_as_goal_models_to_find_security_tensions/25712316CC BY 4.0info:eu-repo/semantics/openAccessoai:figshare.com:article/257123162021-08-16T03:00:00Z
spellingShingle Visualising personas as goal models to find security tensions
Shamal Faily (5515142)
Information and computing sciences
Cybersecurity and privacy
Information systems
personas
goal models
i*
status_str publishedVersion
title Visualising personas as goal models to find security tensions
title_full Visualising personas as goal models to find security tensions
title_fullStr Visualising personas as goal models to find security tensions
title_full_unstemmed Visualising personas as goal models to find security tensions
title_short Visualising personas as goal models to find security tensions
title_sort Visualising personas as goal models to find security tensions
topic Information and computing sciences
Cybersecurity and privacy
Information systems
personas
goal models
i*