Engaging stakeholders during late stage security design with assumption personas

نویسنده

  • Shamal Faily
چکیده

Purpose – This paper aims to present an approach where assumption personas are used to engage stakeholders in the elicitation and specification of security requirements at a late stage of a system’s design. Design/methodology/approach – The author has devised an approach for developing assumption personas for use in participatory design sessions during the later stages of a system’s design. The author validates this approach using a case study in the e-Science domain. Findings – Engagement follows by focusing on the indirect, rather than direct, implications of security. More design approaches are needed for treating security at a comparatively late stage. Security design techniques should scale to working with sub-optimal input data. Originality/value – This paper contributes an approach where assumption personas engage project team members when eliciting and specifying security requirements at the late stages of a project.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Engaging Stakeholders in Security Design: An Assumption-Driven Approach

System stakeholders fail to engage with security until comparatively late in the design and development process. User Experience artefacts like personas and scenarios create this engagement, but creating and contextualising them is difficult without real-world, empirical data; such data cannot be easily elicited from disengaged stakeholders. This paper presents an approach for engaging stakehol...

متن کامل

The Secret Lives of Assumptions: Developing and Refining Assumption Personas for Secure System Design

Personas are useful for obtaining an empirically grounded understanding of a secure system’s user population, its contexts of use, and possible vulnerabilities and threats endangering it. Often, however, personas need to be partially derived from assumptions; these may be embedded in a variety of different representations. Assumption Personas have been proposed as boundary objects for articulat...

متن کامل

Designing with Only Four People in Mind? - A Case Study of Using Personas to Redesign a Work-Integrated Learning Support System

In this paper we describe and reflect on the use of personas to redesign the 3 prototype of APOSDLE – a system to support informal learning and knowledge transfer in the workplace. Based on the results of a formative evaluation of the 2 prototype we used personas to explore how users’ goals, behaviour and preferences could be communicated to project members during a two-day design workshop, in ...

متن کامل

Animal Personas: Representing Dog Stakeholders in Interaction Design

This paper describes the development and evaluation of animal personas for use in the design and development of interactive product. Building from 196 dog owner reports describing dog behaviours and explaining how they interact with digital media devices, six dog personas are created as examples of both how these can be presented but also of how they can be derived. The created personas are the...

متن کامل

Adapting Personas for Use in Security Visualization Design

The development of security visualization applications must involve the user in the design process in order to create usable systems. However, it is all too easy to lose track of the user during the design and development process, even though upfront investment in extensive user requirements gathering has proven benefits. To address this challenge, we adapt a user-centered design method called ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Inf. & Comput. Security

دوره 23  شماره 

صفحات  -

تاریخ انتشار 2015