Visualising personas as goal models to find security tensions
<h3>Purpose</h3><p dir="ltr">This paper aims to present a tool-supported approach for visualising personas as social goal models, which can subsequently be used to identify security tensions.</p><h3>Design/methodology/approach</h3><p dir="ltr&quo...
محفوظ في:
| المؤلف الرئيسي: | |
|---|---|
| مؤلفون آخرون: | , , |
| منشور في: |
2021
|
| الموضوعات: | |
| الوسوم: |
إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
|
| _version_ | 1864513517744291840 |
|---|---|
| author | Shamal Faily (5515142) |
| author2 | Claudia Iacob (10344619) Raian Ali (12066006) Duncan Ki-Aries (5515145) |
| author2_role | author author author |
| author_facet | Shamal Faily (5515142) Claudia Iacob (10344619) Raian Ali (12066006) Duncan Ki-Aries (5515145) |
| author_role | author |
| dc.creator.none.fl_str_mv | Shamal Faily (5515142) Claudia Iacob (10344619) Raian Ali (12066006) Duncan Ki-Aries (5515145) |
| dc.date.none.fl_str_mv | 2021-08-16T03:00:00Z |
| dc.identifier.none.fl_str_mv | 10.1108/ics-03-2021-0035 |
| dc.relation.none.fl_str_mv | https://figshare.com/articles/journal_contribution/Visualising_personas_as_goal_models_to_find_security_tensions/25712316 |
| dc.rights.none.fl_str_mv | CC BY 4.0 info:eu-repo/semantics/openAccess |
| dc.subject.none.fl_str_mv | Information and computing sciences Cybersecurity and privacy Information systems personas goal models i* |
| dc.title.none.fl_str_mv | Visualising personas as goal models to find security tensions |
| dc.type.none.fl_str_mv | Text Journal contribution info:eu-repo/semantics/publishedVersion text contribution to journal |
| description | <h3>Purpose</h3><p dir="ltr">This paper aims to present a tool-supported approach for visualising personas as social goal models, which can subsequently be used to identify security tensions.</p><h3>Design/methodology/approach</h3><p dir="ltr">The authors devised an approach to partially automate the construction of social goal models from personas. The authors provide two examples of how this approach can identify previously hidden implicit vulnerabilities and validate ethical hazards faced by penetration testers and their safeguards.</p><h3>Findings</h3><p dir="ltr">Visualising personas as goal models makes it easier for stakeholders to see implications of their goals being satisfied or denied and designers to incorporate the creation and analysis of such models into the broader requirements engineering (RE) tool-chain.</p><h3>Originality/value</h3><p dir="ltr">The approach can be used with minimal changes to existing user experience and goal modelling approaches and security RE tools.</p><h2>Other Information</h2><p dir="ltr">Published in: Information & Computer Security<br>License: <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank">https://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1108/ics-03-2021-0035" target="_blank">https://dx.doi.org/10.1108/ics-03-2021-0035</a></p> |
| eu_rights_str_mv | openAccess |
| id | Manara2_f76a3a3f8dfb2cb94abf2c94d1274f26 |
| identifier_str_mv | 10.1108/ics-03-2021-0035 |
| network_acronym_str | Manara2 |
| network_name_str | Manara2 |
| oai_identifier_str | oai:figshare.com:article/25712316 |
| publishDate | 2021 |
| repository.mail.fl_str_mv | |
| repository.name.fl_str_mv | |
| repository_id_str | |
| rights_invalid_str_mv | CC BY 4.0 |
| spelling | Visualising personas as goal models to find security tensionsShamal Faily (5515142)Claudia Iacob (10344619)Raian Ali (12066006)Duncan Ki-Aries (5515145)Information and computing sciencesCybersecurity and privacyInformation systemspersonasgoal modelsi*<h3>Purpose</h3><p dir="ltr">This paper aims to present a tool-supported approach for visualising personas as social goal models, which can subsequently be used to identify security tensions.</p><h3>Design/methodology/approach</h3><p dir="ltr">The authors devised an approach to partially automate the construction of social goal models from personas. The authors provide two examples of how this approach can identify previously hidden implicit vulnerabilities and validate ethical hazards faced by penetration testers and their safeguards.</p><h3>Findings</h3><p dir="ltr">Visualising personas as goal models makes it easier for stakeholders to see implications of their goals being satisfied or denied and designers to incorporate the creation and analysis of such models into the broader requirements engineering (RE) tool-chain.</p><h3>Originality/value</h3><p dir="ltr">The approach can be used with minimal changes to existing user experience and goal modelling approaches and security RE tools.</p><h2>Other Information</h2><p dir="ltr">Published in: Information & Computer Security<br>License: <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank">https://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1108/ics-03-2021-0035" target="_blank">https://dx.doi.org/10.1108/ics-03-2021-0035</a></p>2021-08-16T03:00:00ZTextJournal contributioninfo:eu-repo/semantics/publishedVersiontextcontribution to journal10.1108/ics-03-2021-0035https://figshare.com/articles/journal_contribution/Visualising_personas_as_goal_models_to_find_security_tensions/25712316CC BY 4.0info:eu-repo/semantics/openAccessoai:figshare.com:article/257123162021-08-16T03:00:00Z |
| spellingShingle | Visualising personas as goal models to find security tensions Shamal Faily (5515142) Information and computing sciences Cybersecurity and privacy Information systems personas goal models i* |
| status_str | publishedVersion |
| title | Visualising personas as goal models to find security tensions |
| title_full | Visualising personas as goal models to find security tensions |
| title_fullStr | Visualising personas as goal models to find security tensions |
| title_full_unstemmed | Visualising personas as goal models to find security tensions |
| title_short | Visualising personas as goal models to find security tensions |
| title_sort | Visualising personas as goal models to find security tensions |
| topic | Information and computing sciences Cybersecurity and privacy Information systems personas goal models i* |