Faily, S. and Fléchais, I., 2014. Finding and Resolving Security Misusability with Misusability Cases. Requirements Engineering.
Full text available as:
|
PDF (OPEN ACCESS ARTICLE)
fafl141.pdf - Published Version Available under License Creative Commons Attribution. 1MB | |
Copyright to original material in this document is with the original owner(s). Access to this content through BURO is granted on condition that you use it only for research, scholarly or other non-commercial purposes. If you wish to use it for any other purposes, you must contact BU via BURO@bournemouth.ac.uk. Any third party copyright material in this document remains the property of its respective owner(s). BU grants no licence for further use of that third party material. |
DOI: 10.1007/s00766-014-0217-8
Abstract
Although widely used for both security and usability concerns, scenarios used in security design may not necessarily inform the design of usability, and vice- versa. One way of using scenarios to bridge security and usability involves explicitly describing how design deci- sions can lead to users inadvertently exploiting vulnera- bilities to carry out their production tasks. This paper describes how misusability cases, scenarios that describe how design decisions may lead to usability problems sub- sequently leading to system misuse, address this problem. We describe the related work upon which misusability cases are based before presenting the approach, and illus- trating its application using a case study example. Finally, we describe some findings from this approach that further inform the design of usable and secure systems.
Item Type: | Article |
---|---|
ISSN: | 0947-3602 |
Uncontrolled Keywords: | Goals; Personas; Scenarios; Use cases; Security |
Group: | Faculty of Science & Technology |
ID Code: | 21646 |
Deposited By: | Symplectic RT2 |
Deposited On: | 19 Jan 2015 12:26 |
Last Modified: | 14 Mar 2022 13:50 |
Downloads
Downloads per month over past year
Repository Staff Only - |