Abstract
In this chapter, I describe how personas and scenarios can be adapted to best suit the design of secure and usable systems. I begin by presenting an approach for building personas as part of an IRIS process. Such processes typically rely on empirical data collected for the purpose of creating and using personas, but such data is not always easy to obtain. To work around this restriction, I describe how argumentation models can be used to provide assurance for personas based on assumptions or other data sources. I then examine how this model can be used to link grounded theory models to personas, providing a means of effectively validating personas. Building on the use of argumentation models, I explore how these can be used to better adapt scenarios for usability and security using misusability cases: scenarios which describe how design decisions may lead to usability problems subsequently leading to system misuse.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Pruitt J, Adlin T. The persona lifecycle: keeping people in mind throughout product design. London: Elsevier; 2006.
Noessel C, Cooper A, Reimann R, Cronin D. About face: the essentials of interaction design. 4th ed. Hoboken: Wiley; 2014.
Nielsen L. Personas - User focused design. vol. 15 of Human-computer interaction series. Springer; 2013.
Chapman CN, Milham RP. The persona’s new clothes: methodological and practical arguments against a popular method. In: Proceedings of the human factors and ergonomics society 50th annual meeting; 2006. p. 634–636. http://cnchapman.files.wordpress.com/2007/03/chapman-milham-personas-hfes2006-0139-0330pdf.
Burge JE, Carroll JM, McCall R, Mistrik I. Rationale-based software engineering. Springer; 2008.
Toulmin S. The uses of argument. updated ed. Cambridge University Press; 2003.
Nuseibeh B, Haley CB, Foster C. Securing the skies: in requirements we trust. IEEE Comput. 2009;42(9):64 –72.
Corbin JM, Strauss AL. Basics of qualitative research: techniques and procedures for developing grounded theory. 3rd ed. Sage Publications Inc.; 2008.
Faily S. CAIRIS web site; 2018. http://cairis.org.
Faily S, Fléchais I. Designing and aligning e-science security culture with design. Inf. Manag. Comput. Secur. 2010;18(5):339–49.
Faily S. Creating Personas using the Persona Helper, CAIRIS, and Trello; 2017. https://doi.org/10.13140/RG.2.2.29180.54403.
Faily S. Persona Helper Chrome extension; 2017. https://github.com/failys/persona_helper.
Fog Creek Software. Trello website; 2018. https://trello.com.
Dewar JA. Assumption-based planning: a tool for reducing avoidable surprises. Cambridge University Press; 2002.
Darley JM, Latané B. Norms and normative behaviour: field studies of social interdependence. In: Berkowitz L, Macaulay J, editors. Altruism and Helping Behaviour. Academic Press; 1970.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this chapter
Cite this chapter
Faily, S. (2018). Adapting Personas and Scenarios for Security and Usability Design. In: Designing Usable and Secure Software with IRIS and CAIRIS. Springer, Cham. https://doi.org/10.1007/978-3-319-75493-2_6
Download citation
DOI: https://doi.org/10.1007/978-3-319-75493-2_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-75492-5
Online ISBN: 978-3-319-75493-2
eBook Packages: Computer ScienceComputer Science (R0)