Anton Partridge
The application of useless Japanese inventions for requirements elicitation in information security.
Partridge, Anton; Faily, Shamal
Authors
Shamal Faily
Abstract
Rules of requirements elicitation in security are broken through the use of Chindōgu, by designing impractical security countermeasures in the first instance, then using these to create usable security requirements. We present a process to conceive the requirements in Chindōgu form. We evaluate the usefulness of this process by applying it in three workshops with data gathered from a European rail company, and comparing requirements elicited by this process with a set of control requirements.
Citation
PARTRIDGE, A. and FAILY, S. 2016. The application of useless Japanese inventions for requirements elicitation in information security. In Proceedings of the 30th International BCS human computer interaction conference (HCI 2016): fusion, 11-15 July 2016, Poole, UK. Swindon: BCS [online], article number 102. Available from: https://doi.org/10.14236/ewic/HCI2016.102
Presentation Conference Type | Conference Paper (published) |
---|---|
Conference Name | 30th International BCS human computer interaction conference (HCI 2016): fusion |
Start Date | Jul 11, 2016 |
End Date | Jul 15, 2016 |
Acceptance Date | Jul 11, 2016 |
Online Publication Date | Jul 31, 2016 |
Publication Date | Jul 31, 2016 |
Deposit Date | Dec 13, 2021 |
Publicly Available Date | Dec 13, 2021 |
Publisher | BCS, The Chartered Institute for IT |
Peer Reviewed | Peer Reviewed |
Series Title | Electronic workshops in computing |
Series ISSN | 1477-9358 |
DOI | https://doi.org/10.14236/ewic/HCI2016.102 |
Keywords | Systems security; Security risk analysis; Requirements engineering; Chindōgu |
Public URL | https://rgu-repository.worktribe.com/output/1427745 |
Files
PARTRIDGE 2016 The application of useless
(355 Kb)
PDF
Publisher Licence URL
https://creativecommons.org/licenses/by/4.0/
You might also like
Privacy goals for the data lifecycle.
(2022)
Journal Article
Assessing system of systems information security risk with OASoSIS.
(2022)
Journal Article
Visualising personas as goal models to find security tensions.
(2021)
Journal Article
Evaluating privacy: determining user privacy expectations on the web.
(2021)
Journal Article
DPIA in context: applying DPIA to assess privacy risks of cyber physical systems.
(2020)
Journal Article
Downloadable Citations
About OpenAIR@RGU
Administrator e-mail: publications@rgu.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2025
Advanced Search