Dr Shamal Faily s.faily@rgu.ac.uk
Lecturer
Personas are useful for considering how users of a system might behave, but problematic when accounting for hidden behaviours not obvious from their descriptions alone. Formal methods can potentially identify such subtleties in interactive systems, but we lack methods for eliciting models from qualitative persona descriptions. We present a framework for eliciting and specifying formal models of persona behaviour that a persona might, in certain circumstances, engage in. We also summarise our preliminary work to date evaluating this framework.
FAILY, S., POWER, D., ARMSTRONG, P. and FLÉCHAIS, I. 2013. Formal evaluation of persona trustworthiness with EUSTACE. Presented at the 6th International conference on trust and trustworthy computing (TRUST 2013), 17-19 June 2013, London, UK.
Presentation Conference Type | Poster |
---|---|
Conference Name | 6th International conference on trust and trustworthy computing (TRUST 2013) |
Conference Location | London, UK |
Start Date | Jun 17, 2013 |
End Date | Jun 19, 2013 |
Deposit Date | Dec 7, 2021 |
Publicly Available Date | Dec 7, 2021 |
DOI | https://doi.org/10.1007/978-3-642-38908-5_20 |
Keywords | User personas; User behaviour; User-centred design; Software engineering |
Public URL | https://rgu-repository.worktribe.com/output/1446676 |
Additional Information | The extended abstract for this poster has been published with the following citation: FAILY, S., POWER, D., ARMSTRONG, P. and FLÉCHAIS, I. 2013. Formal evaluation of persona trustworthiness with EUSTACE. In Huth, M., Asokan, N., Čapkun, S., Fléchais, I. and Coles-Kemp, L. (eds.) Trust and trustworthy computing: proceedings of the 6th International conference on trust and trustworthy computing (TRUST 2013), 17-19 June 2013, London, UK. Lecture notes in computer science, 7904. Cham: Springer [online], pages 267-268. Available from: https://doi.org/10.1007/978-3-642-38908-5_20 |
FAILY 2013 Formal evaluation of persona (EXTENDED ABSTRACT)
(262 Kb)
PDF
Assessing system of systems information security risk with OASoSIS.
(2022)
Journal Article
Integrated design framework for facilitating systems-theoretic process analysis.
(2022)
Conference Proceeding
Cybersecurity user requirements analysis: the ECHO approach.
(2022)
Conference Proceeding
Use-case informed task analysis for secure and usable design solutions in rail.
(2021)
Conference Proceeding
Visualising personas as goal models to find security tensions.
(2021)
Journal Article
About OpenAIR@RGU
Administrator e-mail: publications@rgu.ac.uk
This application uses the following open-source libraries:
Apache License Version 2.0 (http://www.apache.org/licenses/)
Apache License Version 2.0 (http://www.apache.org/licenses/)
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Advanced Search