Skip to main content

Research Repository

Advanced Search

The application of useless Japanese inventions for requirements elicitation in information security.

Partridge, Anton; Faily, Shamal

Authors

Anton Partridge



Abstract

Rules of requirements elicitation in security are broken through the use of Chind?gu, by designing impractical security countermeasures in the first instance, then using these to create usable security requirements. We present a process to conceive the requirements in Chind?gu form. We evaluate the usefulness of this process by applying it in three workshops with data gathered from a European rail company, and comparing requirements elicited by this process with a set of control requirements.

Citation

PARTRIDGE, A. and FAILY, S. 2016. The application of useless Japanese inventions for requirements elicitation in information security. In Proceedings of the 30th International BCS human computer interaction conference (HCI 2016): fusion, 11-15 July 2016, Poole, UK. Swindon: BCS [online], article number 102. Available from: https://doi.org/10.14236/ewic/HCI2016.102

Conference Name 30th International BCS human computer interaction conference (HCI 2016): fusion
Conference Location Poole, UK
Start Date Jul 11, 2016
End Date Jul 15, 2016
Acceptance Date Jul 11, 2016
Online Publication Date Jul 31, 2016
Publication Date Jul 31, 2016
Deposit Date Dec 13, 2021
Publicly Available Date Dec 13, 2021
Publisher BCS, The Chartered Institute for IT
Series Title Electronic workshops in computing
Series ISSN 1477-9358
DOI https://doi.org/10.14236/ewic/HCI2016.102
Keywords Systems security; Security risk analysis; Requirements engineering; Chind?gu
Public URL https://rgu-repository.worktribe.com/output/1427745

Files





You might also like



Downloadable Citations