z-logo
open-access-imgOpen Access
The Application of useless Japanese Inventions for Requirements Elicitation in Information Security
Author(s) -
Anton Partridge,
Shamal Faily
Publication year - 2016
Publication title -
electronic workshops in computing
Language(s) - English
Resource type - Conference proceedings
ISSN - 1477-9358
DOI - 10.14236/ewic/hci2016.102
Subject(s) - requirements elicitation , usable , computer science , process (computing) , requirements analysis , requirements management , set (abstract data type) , information security , computer security , software , world wide web , programming language , operating system
Rules of requirements elicitation in security are broken through the use of Chindōgu, by designing impractical security countermeasures in the first instance, then using these to create usable security requirements. We present a process to conceive the requirements in Chindōgu form. We evaluate the usefulness of this process by applying it in three workshops with data gathered from a European rail company, and comparing requirements elicited by this process with a set of control requirements.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom