@inproceedings { , title = {The application of useless Japanese inventions for requirements elicitation in information security.}, abstract = {Rules of requirements elicitation in security are broken through the use of Chindōgu, by designing impractical security countermeasures in the first instance, then using these to create usable security requirements. We present a process to conceive the requirements in Chindōgu form. We evaluate the usefulness of this process by applying it in three workshops with data gathered from a European rail company, and comparing requirements elicited by this process with a set of control requirements.}, conference = {30th International BCS human computer interaction conference (HCI 2016): fusion}, doi = {10.14236/ewic/HCI2016.102}, note = {INFO COMPLETE (notified by contact 13.12.2021 GB) PERMISSION GRANTED (published under CC BY 13.12.2021 GB) DOCUMENT READY (downloaded VOR 13.12.2021 GB) ADDITIONAL INFO: Shamal Faily}, publicationstatus = {Published}, publisher = {BCS, The Chartered Institute for IT}, url = {https://rgu-repository.worktribe.com/output/1427745}, keyword = {Systems security, Security risk analysis, Requirements engineering, Chindōgu}, year = {2016}, author = {Partridge, Anton and Faily, Shamal} }