Skip to main content

2024 | OriginalPaper | Buchkapitel

US4USec: A User Story Model for Usable Security

verfasst von : Mohamad Gharib

Erschienen in: Research Challenges in Information Science

Verlag: Springer Nature Switzerland

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Constant integration of new technologies in our daily lives exposes us to various security threats. While numerous security solutions have been developed to protect us from these threats, they fail due to users’ insufficient comprehension of how to employ them optimally. This challenge often stems from inadequate capture of Usable Security (USec) requirements, leading to these requirements being overlooked or not properly considered in the final solution, resulting in barely usable security solutions. A viable solution is to adeptly capturing USec requirements. Although techniques like User Stories (US) have gained popularity for focusing on users’ needs, they encounter difficulties when dealing with non-functional requirements (NFR), like USec. This occurs due to the lack of well-defined US models explicitly tailored to address these particular requirements. This paper aims to tackle this issue by proposing US4USec, a US model tailored for USec. US4USec has been constructed based on best practices for the consideration and integration of NFR into US models that have been identified via a Systematic Literature Review (SLR). The coverage and completeness of US4USec have been demonstrated by applying it to a set of security US.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
Detailed information about papers selection, summary of their contributions, and pros and cons of each used method of the final selected papers can be found at https://​zenodo.​org/​records/​10806824.
 
2
A security feature may not always depend on a functional feature. Consequently, the functional feature and its AC are optional.
 
4
The results of applying the US4USec model to the set of security US can be found at https://​zenodo.​org/​records/​10806824.
 
Literatur
1.
Zurück zum Zitat Lennartsson, M., Kavrestad, J., Nohlberg, M.: Exploring the meaning of usable security - a literature review. Info. Comput. Secur. 29(4), 647–663 (2021)CrossRef Lennartsson, M., Kavrestad, J., Nohlberg, M.: Exploring the meaning of usable security - a literature review. Info. Comput. Secur. 29(4), 647–663 (2021)CrossRef
2.
Zurück zum Zitat Jean Camp, L.: Mental models of privacy and security. IEEE Technol. Soc. Mag. 28(3), 37–46 (2009)CrossRef Jean Camp, L.: Mental models of privacy and security. IEEE Technol. Soc. Mag. 28(3), 37–46 (2009)CrossRef
4.
Zurück zum Zitat Gutfleisch, M., Klemmer, J.H., Busch, N., Acar, Y., Sasse, M.A., Fahl, S.: How does usable security (not) end up in software products? Results from a qualitative interview study. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 893–910 (2022) Gutfleisch, M., Klemmer, J.H., Busch, N., Acar, Y., Sasse, M.A., Fahl, S.: How does usable security (not) end up in software products? Results from a qualitative interview study. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 893–910 (2022)
5.
Zurück zum Zitat Medeiros, J., Vasconcelos, A., Goulao, M., Silva, C., Araujo, J.: An approach based on design practices to specify requirements in agile projects. In: The ACM Symposium on Applied Computing, pp. 1114–1121 (2017) Medeiros, J., Vasconcelos, A., Goulao, M., Silva, C., Araujo, J.: An approach based on design practices to specify requirements in agile projects. In: The ACM Symposium on Applied Computing, pp. 1114–1121 (2017)
6.
7.
Zurück zum Zitat Cohn, M.: User Stories Applied for Agile Software Development (2004) Cohn, M.: User Stories Applied for Agile Software Development (2004)
10.
Zurück zum Zitat Hevner, A.R., March, S.T., Park, J., Ram, S.: Design science in information systems research. MIS Q. 28(1), 75–105 (2004)CrossRef Hevner, A.R., March, S.T., Park, J., Ram, S.: Design science in information systems research. MIS Q. 28(1), 75–105 (2004)CrossRef
11.
Zurück zum Zitat Kitchenham, B., Brereton, P., Budgen, D., Turner, M., Bailey, J., Limkman, S.: Systematic literature reviews in software engineering - a systematic literature review. Inf. Softw. Technol. 51(1), 7–15 (2009)CrossRef Kitchenham, B., Brereton, P., Budgen, D., Turner, M., Bailey, J., Limkman, S.: Systematic literature reviews in software engineering - a systematic literature review. Inf. Softw. Technol. 51(1), 7–15 (2009)CrossRef
12.
Zurück zum Zitat Marques, A.B., Costa, A.F., Santos, I., Maria Castro De Andrade, R.: Enriching user stories with usability features in a remote agile project: a case study. In: ACM International Conference Proceeding Series, pp. 1–10 (2022) Marques, A.B., Costa, A.F., Santos, I., Maria Castro De Andrade, R.: Enriching user stories with usability features in a remote agile project: a case study. In: ACM International Conference Proceeding Series, pp. 1–10 (2022)
13.
Zurück zum Zitat Lopes, L.A., Pinheiro, E.G., Da Silva, T.S., Zaina, L.A.M.: Using UxD artefacts to support the writing of user stories: findings of an empirical study with agile developers. In: ACM International Conference Proceeding Series, vol. Part F1477, pp. 1–4. Association for Computing Machinery (2018) Lopes, L.A., Pinheiro, E.G., Da Silva, T.S., Zaina, L.A.M.: Using UxD artefacts to support the writing of user stories: findings of an empirical study with agile developers. In: ACM International Conference Proceeding Series, vol. Part F1477, pp. 1–4. Association for Computing Machinery (2018)
14.
Zurück zum Zitat Nielsen, J.: 10 Usability Heuristics for User Interface. TR (1995) Nielsen, J.: 10 Usability Heuristics for User Interface. TR (1995)
15.
Zurück zum Zitat Domah, D., Mitropoulos, F.J.: The NERV methodology: a lightweight process for addressing non-functional requirements in agile software development. In: IEEE SOUTHEASTCON, pp. 1–7 (2015) Domah, D., Mitropoulos, F.J.: The NERV methodology: a lightweight process for addressing non-functional requirements in agile software development. In: IEEE SOUTHEASTCON, pp. 1–7 (2015)
16.
Zurück zum Zitat Ionita, D., van der Velden, C., Ikkink, HJ.K., Neven, E., Daneva, M., Kuipers, M.: Towards risk-driven security requirements management in agile software development. In: Cappiello, C., Ruiz, M. (eds.) Information Systems Engineering in Responsible Information Systems, CAiSE 2019. LNBIP, vol. 350, pp. 133–144. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-21297-1_12 Ionita, D., van der Velden, C., Ikkink, HJ.K., Neven, E., Daneva, M., Kuipers, M.: Towards risk-driven security requirements management in agile software development. In: Cappiello, C., Ruiz, M. (eds.) Information Systems Engineering in Responsible Information Systems, CAiSE 2019. LNBIP, vol. 350, pp. 133–144. Springer, Cham (2019). https://​doi.​org/​10.​1007/​978-3-030-21297-1_​12
17.
Zurück zum Zitat Lucassen, G., Dalpiaz, F., Martijn, J., Van Der Werf, E.M., Brinkkemper, S.: Forging high-quality user stories: towards a discipline for agile requirements. In: Requirements Engineering Conference, pp. 126–135. IEEE (2015) Lucassen, G., Dalpiaz, F., Martijn, J., Van Der Werf, E.M., Brinkkemper, S.: Forging high-quality user stories: towards a discipline for agile requirements. In: Requirements Engineering Conference, pp. 126–135. IEEE (2015)
18.
Zurück zum Zitat Lindland, O.I., Sindre, G., Solvberg, A.: Understanding quality in conceptual modeling. IEEE Softw. 11(2), 42–49 (1994)CrossRef Lindland, O.I., Sindre, G., Solvberg, A.: Understanding quality in conceptual modeling. IEEE Softw. 11(2), 42–49 (1994)CrossRef
19.
Zurück zum Zitat Mujinga, M., Eloff, M.M., Kroeze, J.H.: Towards a heuristic model for usable and secure online banking. In: Proceedings of the 24th Australasian Conference on Information Systems, pp. 1–12 (2013) Mujinga, M., Eloff, M.M., Kroeze, J.H.: Towards a heuristic model for usable and secure online banking. In: Proceedings of the 24th Australasian Conference on Information Systems, pp. 1–12 (2013)
20.
Zurück zum Zitat Yeratziotis, A., Pottas, D., van Greunen, D.: A usable security heuristic evaluation for the online health social networking paradigm. Int. J. Hum. Comput. Interact. 28(10), 678–694 (2012)CrossRef Yeratziotis, A., Pottas, D., van Greunen, D.: A usable security heuristic evaluation for the online health social networking paradigm. Int. J. Hum. Comput. Interact. 28(10), 678–694 (2012)CrossRef
Metadaten
Titel
US4USec: A User Story Model for Usable Security
verfasst von
Mohamad Gharib
Copyright-Jahr
2024
DOI
https://doi.org/10.1007/978-3-031-59465-6_16

Premium Partner