Discovering requirements: how to specify products and services, 2009. ,
Rationale-Based Software Engineering, 2008. ,
DOI : 10.1007/978-3-540-77583-6
Integrating the Personas Technique into the Requirements Analysis Activity, 2008 Mexican International Conference on Computer Science, pp.104-112, 2008. ,
DOI : 10.1109/ENC.2008.40
The persona's new clothes: Methodological and practical arguments against a popular method, Proceedings of the Human Factors and Ergonomics Society 50th Annual Meeting, 2006. ,
The Inmates are Running the Asylum, 1999. ,
DOI : 10.1007/978-3-322-99786-9_1
About Face 3: The Essentials of Interaction Design, 2007. ,
A meta-model for usable secure requirements engineering, Proceedings of the 2010 ICSE Workshop on Software Engineering for Secure Systems, SESS '10, pp.126-135, 2010. ,
DOI : 10.1145/1809100.1809105
Analysing and Visualising Security and Usability in IRIS, 2010 International Conference on Availability, Reliability and Security, 2010. ,
DOI : 10.1109/ARES.2010.28
Barry is not the weakest link: Eliciting Secure System Requirements with Personas, BCS HCI '10: Proceedings of the 2010 British Computer Society Conference on Human-Computer Interaction, 2010. ,
Arguing satisfaction of security requirements, Integrating Security and Software Engineering, pp.16-43, 2007. ,
Handling obstacles in goal-oriented requirements engineering. Software Engineering, IEEE Transactions on, vol.26, issue.10, pp.978-1005, 2000. ,
Securing the Skies: In Requirements We Trust, Computer, vol.42, issue.9, pp.64-72, 2009. ,
DOI : 10.1109/MC.2009.299
The persona lifecycle: keeping people in mind throughout product design, 2006. ,
The uses of argument, 2003. ,
DOI : 10.1017/CBO9780511840005