Shamal Faily
Formal evaluation of persona trustworthiness with EUSTACE.
Faily, Shamal; Power, David; Armstrong, Philip; Fl�chais, Ivan
Authors
David Power
Philip Armstrong
Ivan Fl�chais
Abstract
Personas are useful for considering how users of a system might behave, but problematic when accounting for hidden behaviours not obvious from their descriptions alone. Formal methods can potentially identify such subtleties in interactive systems, but we lack methods for eliciting models from qualitative persona descriptions. We present a framework for eliciting and specifying formal models of persona behaviour that a persona might, in certain circumstances, engage in. We also summarise our preliminary work to date evaluating this framework.
Citation
FAILY, S., POWER, D., ARMSTRONG, P. and FLÉCHAIS, I. 2013. Formal evaluation of persona trustworthiness with EUSTACE. Presented at the 6th International conference on trust and trustworthy computing (TRUST 2013), 17-19 June 2013, London, UK.
Presentation Conference Type | Poster |
---|---|
Conference Name | 6th International conference on trust and trustworthy computing (TRUST 2013) |
Start Date | Jun 17, 2013 |
End Date | Jun 19, 2013 |
Deposit Date | Dec 7, 2021 |
Publicly Available Date | Dec 7, 2021 |
Peer Reviewed | Peer Reviewed |
DOI | https://doi.org/10.1007/978-3-642-38908-5_20 |
Keywords | User personas; User behaviour; User-centred design; Software engineering |
Public URL | https://rgu-repository.worktribe.com/output/1446676 |
Additional Information | The extended abstract for this poster has been published with the following citation: FAILY, S., POWER, D., ARMSTRONG, P. and FLÉCHAIS, I. 2013. Formal evaluation of persona trustworthiness with EUSTACE. In Huth, M., Asokan, N., Čapkun, S., Fléchais, I. and Coles-Kemp, L. (eds.) Trust and trustworthy computing: proceedings of the 6th International conference on trust and trustworthy computing (TRUST 2013), 17-19 June 2013, London, UK. Lecture notes in computer science, 7904. Cham: Springer [online], pages 267-268. Available from: https://doi.org/10.1007/978-3-642-38908-5_20 |
Files
FAILY 2013 Formal evaluation of persona (EXTENDED ABSTRACT)
(262 Kb)
PDF
You might also like
Privacy goals for the data lifecycle.
(2022)
Journal Article
Assessing system of systems information security risk with OASoSIS.
(2022)
Journal Article
Visualising personas as goal models to find security tensions.
(2021)
Journal Article
Evaluating privacy: determining user privacy expectations on the web.
(2021)
Journal Article
DPIA in context: applying DPIA to assess privacy risks of cyber physical systems.
(2020)
Journal Article
Downloadable Citations
About OpenAIR@RGU
Administrator e-mail: publications@rgu.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2025
Advanced Search