Skip to main content

Adapting Personas and Scenarios for Security and Usability Design

  • Chapter
  • First Online:
Designing Usable and Secure Software with IRIS and CAIRIS
  • 728 Accesses

Abstract

In this chapter, I describe how personas and scenarios can be adapted to best suit the design of secure and usable systems. I begin by presenting an approach for building personas as part of an IRIS process. Such processes typically rely on empirical data collected for the purpose of creating and using personas, but such data is not always easy to obtain. To work around this restriction, I describe how argumentation models can be used to provide assurance for personas based on assumptions or other data sources. I then examine how this model can be used to link grounded theory models to personas, providing a means of effectively validating personas. Building on the use of argumentation models, I explore how these can be used to better adapt scenarios for usability and security using misusability cases: scenarios which describe how design decisions may lead to usability problems subsequently leading to system misuse.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    This is drawn from an anonymised transcript used in the case study in Chap. 8.

  2. 2.

    Rick is one of the personas created as part of the case study described in Chap. 7.

References

  1. Pruitt J, Adlin T. The persona lifecycle: keeping people in mind throughout product design. London: Elsevier; 2006.

    Google Scholar 

  2. Noessel C, Cooper A, Reimann R, Cronin D. About face: the essentials of interaction design. 4th ed. Hoboken: Wiley; 2014.

    Google Scholar 

  3. Nielsen L. Personas - User focused design. vol. 15 of Human-computer interaction series. Springer; 2013.

    Google Scholar 

  4. Chapman CN, Milham RP. The persona’s new clothes: methodological and practical arguments against a popular method. In: Proceedings of the human factors and ergonomics society 50th annual meeting; 2006. p. 634–636. http://cnchapman.files.wordpress.com/2007/03/chapman-milham-personas-hfes2006-0139-0330pdf.

  5. Burge JE, Carroll JM, McCall R, Mistrik I. Rationale-based software engineering. Springer; 2008.

    Google Scholar 

  6. Toulmin S. The uses of argument. updated ed. Cambridge University Press; 2003.

    Google Scholar 

  7. Nuseibeh B, Haley CB, Foster C. Securing the skies: in requirements we trust. IEEE Comput. 2009;42(9):64 –72.

    Google Scholar 

  8. Corbin JM, Strauss AL. Basics of qualitative research: techniques and procedures for developing grounded theory. 3rd ed. Sage Publications Inc.; 2008.

    Google Scholar 

  9. Faily S. CAIRIS web site; 2018. http://cairis.org.

  10. Faily S, Fléchais I. Designing and aligning e-science security culture with design. Inf. Manag. Comput. Secur. 2010;18(5):339–49.

    Google Scholar 

  11. Faily S. Creating Personas using the Persona Helper, CAIRIS, and Trello; 2017. https://doi.org/10.13140/RG.2.2.29180.54403.

  12. Faily S. Persona Helper Chrome extension; 2017. https://github.com/failys/persona_helper.

  13. Fog Creek Software. Trello website; 2018. https://trello.com.

  14. Dewar JA. Assumption-based planning: a tool for reducing avoidable surprises. Cambridge University Press; 2002.

    Google Scholar 

  15. Darley JM, Latané B. Norms and normative behaviour: field studies of social interdependence. In: Berkowitz L, Macaulay J, editors. Altruism and Helping Behaviour. Academic Press; 1970.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shamal Faily .

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Faily, S. (2018). Adapting Personas and Scenarios for Security and Usability Design. In: Designing Usable and Secure Software with IRIS and CAIRIS. Springer, Cham. https://doi.org/10.1007/978-3-319-75493-2_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-75493-2_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-75492-5

  • Online ISBN: 978-3-319-75493-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics