Analysing Chindōgu: Applying Defamiliarisation to Security Design

نویسنده

  • Shamal Faily
چکیده

Copyright is held by the author/owner(s). CHI 2012, May 5–10, 2012, Austin, TX, USA. ACM xxx-x-xxxx-xxxx-x/xx/xx. Abstract Envisaging how secure systems might be attacked is difficult without adequate attacker models or relying on sterotypes. Defamiliarisation removes this need for a priori domain knowledge and encourages designers to think critically about system properties otherwise considered innocuous. However, questions remain about how such an approach might fit into the larger design process. This paper illustrates how security requirements were elicited by building a security chindōgu, and using defamiliarisation to help analyse it. We summarise this technique before briefly describing its use in a real-world setting.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Software for Interactive Secure Systems Design: Lessons Learned Developing and Applying CAIRIS

As systems become more complex, the potential for security vulnerabilities being introduced increases. If we are to provide assurances about systems we design then we need the means of analysing, managing, and generally making sense of the data that contributes to the design. Unfortunately, despite ongoing research into tools for supporting secure software development, there are few examples of...

متن کامل

Applying design ideas to promote security of urban spaces

Security is one of the most critical factors affecting the quality of urban spaces. Nowadays, most of these spaces have become merely pathways with neither social life nor sense of belonging to it. Insufficiency of public surveillance along with weak sense of control and surveillance results in spaces with high crime rate. In the late 60s and early 70s, high crime statistics in open urban space...

متن کامل

Mapping of McGraw Cycle to RUP Methodology for Secure Software Developing

Designing a secure software is one of the major phases in developing a robust software. The McGraw life cycle, as one of the well-known software security development approaches, implements different touch points as a collection of software security practices. Each touch point includes explicit instructions for applying security in terms of design, coding, measurement, and maintenance of softwar...

متن کامل

Groupware Task Analysis in practice: a scientific approach meets security problems

Groupware Task Analysis (GTA) is applied for the redesign of a commercial security system. The problem is the confidentiality of the knowledge on the task domain. The system is the actual security systems in use in companies, AND, obviously, none of them is eager to have details of its security management situation and security procedures being made available to outsiders, even if these are emp...

متن کامل

Interdependent Security Game Design over Constrained Linear Influence Networks

In today's highly interconnected networks, security of the entities are often interdependent. This means security decisions of the agents are not only influenced by their own costs and constraints, but also are affected by their neighbors’ decisions. Game theory provides a rich set of tools to analyze such influence networks. In the game model, players try to maximize their utilities through se...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012