{"id":"https://openalex.org/W2224736605","doi":"https://doi.org/10.1108/ics-10-2014-0066","title":"Engaging stakeholders during late stage security design with assumption personas","display_name":"Engaging stakeholders during late stage security design with assumption personas","publication_year":2015,"publication_date":"2015-10-12","ids":{"openalex":"https://openalex.org/W2224736605","doi":"https://doi.org/10.1108/ics-10-2014-0066","mag":"2224736605"},"language":"en","primary_location":{"id":"doi:10.1108/ics-10-2014-0066","is_oa":true,"landing_page_url":"https://doi.org/10.1108/ics-10-2014-0066","pdf_url":"https://www.emeraldinsight.com/doi/pdfplus/10.1108/ICS-10-2014-0066","source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://www.emeraldinsight.com/doi/pdfplus/10.1108/ICS-10-2014-0066","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5045597082","display_name":"Shamal Faily","orcid":"https://orcid.org/0000-0002-2859-1143"},"institutions":[{"id":"https://openalex.org/I9300472","display_name":"Bournemouth University","ror":"https://ror.org/05wwcw481","country_code":"GB","type":"education","lineage":["https://openalex.org/I9300472"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Shamal Faily","raw_affiliation_strings":["Department of Computing & Informatics, Bournemouth University, Poole, UK"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computing & Informatics, Bournemouth University, Poole, UK","institution_ids":["https://openalex.org/I9300472"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5045597082"],"corresponding_institution_ids":["https://openalex.org/I9300472"],"apc_list":null,"apc_paid":null,"fwci":1.3315,"has_fulltext":true,"cited_by_count":10,"citation_normalized_percentile":{"value":0.82136461,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"23","issue":"4","first_page":"435","last_page":"446"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T14074","display_name":"Persona Design and Applications","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1709","display_name":"Human-Computer Interaction"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T14074","display_name":"Persona Design and Applications","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1709","display_name":"Human-Computer Interaction"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11024","display_name":"Information Systems Theories and Implementation","score":0.9855999946594238,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10803","display_name":"Innovative Human-Technology Interaction","score":0.9836999773979187,"subfield":{"id":"https://openalex.org/subfields/1709","display_name":"Human-Computer Interaction"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/persona","display_name":"Persona","score":0.8325511813163757},{"id":"https://openalex.org/keywords/originality","display_name":"Originality","score":0.5903341770172119},{"id":"https://openalex.org/keywords/requirements-elicitation","display_name":"Requirements elicitation","score":0.5729393362998962},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5560130476951599},{"id":"https://openalex.org/keywords/participatory-design","display_name":"Participatory design","score":0.538473904132843},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.4570713937282562},{"id":"https://openalex.org/keywords/process-management","display_name":"Process management","score":0.4303932785987854},{"id":"https://openalex.org/keywords/design-science","display_name":"Design science","score":0.41158705949783325},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.4027157425880432},{"id":"https://openalex.org/keywords/requirements-analysis","display_name":"Requirements analysis","score":0.289542555809021},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.2512974739074707},{"id":"https://openalex.org/keywords/sociology","display_name":"Sociology","score":0.23488345742225647},{"id":"https://openalex.org/keywords/operations-management","display_name":"Operations management","score":0.19833016395568848},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.19295233488082886},{"id":"https://openalex.org/keywords/qualitative-research","display_name":"Qualitative research","score":0.1905449628829956},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.13067883253097534},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.08078846335411072}],"concepts":[{"id":"https://openalex.org/C313442","wikidata":"https://www.wikidata.org/wiki/Q778556","display_name":"Persona","level":2,"score":0.8325511813163757},{"id":"https://openalex.org/C2776950860","wikidata":"https://www.wikidata.org/wiki/Q2914681","display_name":"Originality","level":3,"score":0.5903341770172119},{"id":"https://openalex.org/C45384764","wikidata":"https://www.wikidata.org/wiki/Q838667","display_name":"Requirements elicitation","level":4,"score":0.5729393362998962},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5560130476951599},{"id":"https://openalex.org/C2777455480","wikidata":"https://www.wikidata.org/wiki/Q1038171","display_name":"Participatory design","level":3,"score":0.538473904132843},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.4570713937282562},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.4303932785987854},{"id":"https://openalex.org/C2780103759","wikidata":"https://www.wikidata.org/wiki/Q5264375","display_name":"Design science","level":2,"score":0.41158705949783325},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.4027157425880432},{"id":"https://openalex.org/C59488412","wikidata":"https://www.wikidata.org/wiki/Q187147","display_name":"Requirements analysis","level":3,"score":0.289542555809021},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.2512974739074707},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.23488345742225647},{"id":"https://openalex.org/C21547014","wikidata":"https://www.wikidata.org/wiki/Q1423657","display_name":"Operations management","level":1,"score":0.19833016395568848},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.19295233488082886},{"id":"https://openalex.org/C190248442","wikidata":"https://www.wikidata.org/wiki/Q839486","display_name":"Qualitative research","level":2,"score":0.1905449628829956},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.13067883253097534},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.08078846335411072},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.0},{"id":"https://openalex.org/C2775922551","wikidata":"https://www.wikidata.org/wiki/Q7135033","display_name":"Parallels","level":2,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1108/ics-10-2014-0066","is_oa":true,"landing_page_url":"https://doi.org/10.1108/ics-10-2014-0066","pdf_url":"https://www.emeraldinsight.com/doi/pdfplus/10.1108/ICS-10-2014-0066","source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"},{"id":"pmh:oai:eprints.bournemouth.ac.uk:22704","is_oa":true,"landing_page_url":null,"pdf_url":"http://eprints.bournemouth.ac.uk/22704/1/ICS-10-2014-0066.pdf","source":{"id":"https://openalex.org/S4306400187","display_name":"Bournemouth University Research Online (Bournemouth University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I9300472","host_organization_name":"Bournemouth University","host_organization_lineage":["https://openalex.org/I9300472"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Article"},{"id":"pmh:oai:rgu-repository.worktribe.com:1427738","is_oa":true,"landing_page_url":"https://rgu-repository.worktribe.com/output/1427738","pdf_url":null,"source":{"id":"https://openalex.org/S4306400814","display_name":"Open Access Institutional Repository at Robert Gordon University (Robert Gordon University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I522815984","host_organization_name":"Robert Gordon University","host_organization_lineage":["https://openalex.org/I522815984"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Journal Article"}],"best_oa_location":{"id":"doi:10.1108/ics-10-2014-0066","is_oa":true,"landing_page_url":"https://doi.org/10.1108/ics-10-2014-0066","pdf_url":"https://www.emeraldinsight.com/doi/pdfplus/10.1108/ICS-10-2014-0066","source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Partnerships for the goals","score":0.46000000834465027,"id":"https://metadata.un.org/sdg/17"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2224736605.pdf","grobid_xml":"https://content.openalex.org/works/W2224736605.grobid-xml"},"referenced_works_count":25,"referenced_works":["https://openalex.org/W650746900","https://openalex.org/W1036550512","https://openalex.org/W1537884690","https://openalex.org/W1592821266","https://openalex.org/W1753385428","https://openalex.org/W1918878574","https://openalex.org/W1982654818","https://openalex.org/W1997210479","https://openalex.org/W2056503798","https://openalex.org/W2097154968","https://openalex.org/W2097719378","https://openalex.org/W2103224454","https://openalex.org/W2106798436","https://openalex.org/W2107146918","https://openalex.org/W2117818414","https://openalex.org/W2119387527","https://openalex.org/W2123179625","https://openalex.org/W2128089745","https://openalex.org/W2129289644","https://openalex.org/W2136275632","https://openalex.org/W2141808142","https://openalex.org/W2150345553","https://openalex.org/W4229680087","https://openalex.org/W4232387830","https://openalex.org/W6677848350"],"related_works":["https://openalex.org/W2155112746","https://openalex.org/W1566953645","https://openalex.org/W2294650740","https://openalex.org/W1972152093","https://openalex.org/W4313549768","https://openalex.org/W2778917057","https://openalex.org/W4308789043","https://openalex.org/W2518901655","https://openalex.org/W2224736605","https://openalex.org/W2790960032"],"abstract_inverted_index":{"Purpose":[0],"\u2013":[1,34,73,112],"This":[2,113],"paper":[3,114],"aims":[4],"to":[5,14,105],"present":[6],"an":[7,39,116],"approach":[8,40,63,117],"where":[9,118],"assumption":[10,43,119],"personas":[11,44,120],"are":[12,90],"used":[13],"engage":[15,121],"stakeholders":[16],"in":[17,47,68],"the":[18,52,69,79,132],"elicitation":[19],"and":[20,127],"specification":[21],"of":[22,29,55,85,135],"security":[23,94,129],"requirements":[24,130],"at":[25,95,131],"a":[26,30,56,65,96,136],"late":[27,98,133],"stage":[28],"system\u2019s":[31,57],"design.":[32,58],"Design/methodology/approach":[33],"The":[35,59],"author":[36,60],"has":[37],"devised":[38],"for":[41,45,92],"developing":[42],"use":[46],"participatory":[48],"design":[49,88,101],"sessions":[50],"during":[51],"later":[53],"stages":[54,134],"validates":[61],"this":[62],"using":[64],"case":[66],"study":[67],"e-Science":[70],"domain.":[71],"Findings":[72],"Engagement":[74],"follows":[75],"by":[76],"focusing":[77],"on":[78],"indirect,":[80],"rather":[81],"than":[82],"direct,":[83],"implications":[84],"security.":[86],"More":[87],"approaches":[89],"needed":[91],"treating":[93],"comparatively":[97],"stage.":[99],"Security":[100],"techniques":[102],"should":[103],"scale":[104],"working":[106],"with":[107],"sub-optimal":[108],"input":[109],"data.":[110],"Originality/value":[111],"contributes":[115],"project":[122],"team":[123],"members":[124],"when":[125],"eliciting":[126],"specifying":[128],"project.":[137]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2026-05-08T15:41:06.802602","created_date":"2025-10-10T00:00:00"}
