Incorporating the human facet of security in developing systems and services

[1]  Laurie A. Williams,et al.  Systematically Developing Prevention, Detection, and Response Patterns for Security Requirements , 2016, 2016 IEEE 24th International Requirements Engineering Conference Workshops (REW).

[2]  Yasser M. Hausawi,et al.  An Assessment Framework for Usable-Security Based on Decision Science , 2014, HCI.

[3]  Samir Chatterjee,et al.  A Design Science Research Methodology for Information Systems Research , 2008 .

[4]  Apostolos Ampatzoglou,et al.  Investigating quality trade-offs in open source Critical Embedded Systems , 2015, 2015 11th International ACM SIGSOFT Conference on Quality of Software Architectures (QoSA).

[5]  Mathias Mujinga,et al.  Towards a framework for online information security applications development: A socio-technical approach , 2019, South Afr. Comput. J..

[6]  Desheng Dash Wu,et al.  A non-functional requirements tradeoff model in Trustworthy Software , 2012, Inf. Sci..

[7]  Yee-Yin Choong,et al.  Usability and Security Considerations for Public Safety Mobile Authentication , 2016 .

[8]  Jean Vanderdonckt,et al.  A methodology for designing information security feedback based on User Interface Patterns , 2009, Adv. Eng. Softw..

[9]  Laurie A. Williams,et al.  Security requirements patterns: understanding the science behind the art of pattern writing , 2012, 2012 Second IEEE International Workshop on Requirements Patterns (RePa).

[10]  Bashar Nuseibeh,et al.  A framework for security requirements engineering , 2006, SESS '06.

[11]  M. Thüring,et al.  Usability, aesthetics and emotions in human–technology interaction , 2007 .

[12]  Alan R. Hevner,et al.  The Three Cycle View of Design Science , 2007, Scand. J. Inf. Syst..

[13]  ISO / IEC 25010 : 2011 Systems and software engineering — Systems and software Quality Requirements and Evaluation ( SQuaRE ) — System and software quality models , 2013 .

[14]  Ahmed Seffah,et al.  Interdependencies, Conflicts and Trade-Offs Between Security and Usability: Why and How Should We Engineer Them? , 2019, HCI.

[15]  Sebastian Möller,et al.  On the need for different security methods on mobile phones , 2011, Mobile HCI.

[16]  Rizwan Beg,et al.  Integrating Security and Usability at Requirement Specification Process , 2014 .

[17]  Shari Lawrence Pfleeger,et al.  Barriers to Usable Security? Three Organizational Case Studies , 2016, IEEE Security & Privacy.

[18]  Dan Boneh,et al.  Stickler: Defending against Malicious Content Distribution Networks in an Unmodified Browser , 2016, IEEE Security & Privacy.

[19]  Didar Zowghi,et al.  An ontological framework to manage the relative conflicts between security and usability requirements , 2010, 2010 Third International Workshop on Managing Requirements Knowledge.

[20]  Ahmed Seffah,et al.  A Methodology for Aligning Usability and Security in Systems and Services , 2018, 2018 3rd International Conference on Information Systems Engineering (ICISE).

[21]  Stefanos Gritzalis,et al.  Managing User Experience: Usability and Security in a New Era of Software Supremacy , 2017, HCI.

[22]  Annabelle Lee,et al.  Guidelines for Smart Grid Cyber Security , 2010 .

[23]  M. Angela Sasse,et al.  What Usable Security Really Means: Trusting and Engaging Users , 2014, HCI.

[24]  J. D. Tygar,et al.  Usability of Security: A Case Study, , 1998 .

[25]  Majed Alshamari,et al.  A Review of Gaps between Usability and Security/Privacy , 2016 .

[26]  Zhuo Lu,et al.  Cyber security in the Smart Grid: Survey and challenges , 2013, Comput. Networks.

[27]  Frank Stajano,et al.  The usability canary in the security coal mine: A cognitive framework for evaluation and design of usable authentication solutions , 2016, ArXiv.

[28]  Cecilia Mascolo,et al.  Integrating security and usability into the requirements and design process , 2007, Int. J. Electron. Secur. Digit. Forensics.

[29]  Pilsung Choe,et al.  A Framework of Information Security Integrated with Human Factors , 2019, HCI.