Incorporating the human facet of security in developing systems and services
暂无分享,去创建一个
[1] Laurie A. Williams,et al. Systematically Developing Prevention, Detection, and Response Patterns for Security Requirements , 2016, 2016 IEEE 24th International Requirements Engineering Conference Workshops (REW).
[2] Yasser M. Hausawi,et al. An Assessment Framework for Usable-Security Based on Decision Science , 2014, HCI.
[3] Samir Chatterjee,et al. A Design Science Research Methodology for Information Systems Research , 2008 .
[4] Apostolos Ampatzoglou,et al. Investigating quality trade-offs in open source Critical Embedded Systems , 2015, 2015 11th International ACM SIGSOFT Conference on Quality of Software Architectures (QoSA).
[5] Mathias Mujinga,et al. Towards a framework for online information security applications development: A socio-technical approach , 2019, South Afr. Comput. J..
[6] Desheng Dash Wu,et al. A non-functional requirements tradeoff model in Trustworthy Software , 2012, Inf. Sci..
[7] Yee-Yin Choong,et al. Usability and Security Considerations for Public Safety Mobile Authentication , 2016 .
[8] Jean Vanderdonckt,et al. A methodology for designing information security feedback based on User Interface Patterns , 2009, Adv. Eng. Softw..
[9] Laurie A. Williams,et al. Security requirements patterns: understanding the science behind the art of pattern writing , 2012, 2012 Second IEEE International Workshop on Requirements Patterns (RePa).
[10] Bashar Nuseibeh,et al. A framework for security requirements engineering , 2006, SESS '06.
[11] M. Thüring,et al. Usability, aesthetics and emotions in human–technology interaction , 2007 .
[12] Alan R. Hevner,et al. The Three Cycle View of Design Science , 2007, Scand. J. Inf. Syst..
[14] Ahmed Seffah,et al. Interdependencies, Conflicts and Trade-Offs Between Security and Usability: Why and How Should We Engineer Them? , 2019, HCI.
[15] Sebastian Möller,et al. On the need for different security methods on mobile phones , 2011, Mobile HCI.
[16] Rizwan Beg,et al. Integrating Security and Usability at Requirement Specification Process , 2014 .
[17] Shari Lawrence Pfleeger,et al. Barriers to Usable Security? Three Organizational Case Studies , 2016, IEEE Security & Privacy.
[18] Dan Boneh,et al. Stickler: Defending against Malicious Content Distribution Networks in an Unmodified Browser , 2016, IEEE Security & Privacy.
[19] Didar Zowghi,et al. An ontological framework to manage the relative conflicts between security and usability requirements , 2010, 2010 Third International Workshop on Managing Requirements Knowledge.
[20] Ahmed Seffah,et al. A Methodology for Aligning Usability and Security in Systems and Services , 2018, 2018 3rd International Conference on Information Systems Engineering (ICISE).
[21] Stefanos Gritzalis,et al. Managing User Experience: Usability and Security in a New Era of Software Supremacy , 2017, HCI.
[22] Annabelle Lee,et al. Guidelines for Smart Grid Cyber Security , 2010 .
[23] M. Angela Sasse,et al. What Usable Security Really Means: Trusting and Engaging Users , 2014, HCI.
[24] J. D. Tygar,et al. Usability of Security: A Case Study, , 1998 .
[25] Majed Alshamari,et al. A Review of Gaps between Usability and Security/Privacy , 2016 .
[26] Zhuo Lu,et al. Cyber security in the Smart Grid: Survey and challenges , 2013, Comput. Networks.
[27] Frank Stajano,et al. The usability canary in the security coal mine: A cognitive framework for evaluation and design of usable authentication solutions , 2016, ArXiv.
[28] Cecilia Mascolo,et al. Integrating security and usability into the requirements and design process , 2007, Int. J. Electron. Secur. Digit. Forensics.
[29] Pilsung Choe,et al. A Framework of Information Security Integrated with Human Factors , 2019, HCI.