TY - GEN
T1 - Vision
T2 - Design Fiction for Cybersecurity: Using Science Fiction to Help Software Developers Anticipate Problems
AU - Loureiro-Koechlin, Cecilia
AU - Córdoba-Pachón, José-Rodrigo
AU - Weir, Charles
AU - Demetriou, Soteris
AU - Coventry, Lynne
PY - 2022/10/5
Y1 - 2022/10/5
N2 - Security and privacy issues are an ever-increasing problem for software systems. To address them, software developers must anticipate the problems that their developed systems may face, using a process we call ‘threat assessment’. Unfortunately, given the shortage of security experts, and the need to ‘think laterally’, threat assessment is very difficult for many development teams. One possibility is to use stories, known as ‘Design Fiction,’ to help developers visualize different contexts and future use for their software. But such stories are themselves difficult to write. A recent pilot project investigated using a broad-brush threat model and fiction samples derived from existing science fiction literature to help developers create threat assessments for Health Internet-of-Things devices. The preliminary results are encouraging, and open the possibility of developing a method to support developers in threat assessment in any domain.
AB - Security and privacy issues are an ever-increasing problem for software systems. To address them, software developers must anticipate the problems that their developed systems may face, using a process we call ‘threat assessment’. Unfortunately, given the shortage of security experts, and the need to ‘think laterally’, threat assessment is very difficult for many development teams. One possibility is to use stories, known as ‘Design Fiction,’ to help developers visualize different contexts and future use for their software. But such stories are themselves difficult to write. A recent pilot project investigated using a broad-brush threat model and fiction samples derived from existing science fiction literature to help developers create threat assessments for Health Internet-of-Things devices. The preliminary results are encouraging, and open the possibility of developing a method to support developers in threat assessment in any domain.
U2 - 10.1145/3549015.3554295
DO - 10.1145/3549015.3554295
M3 - Conference contribution
SP - 79
EP - 84
BT - EuroUSEC '22: Proceedings of the 2022 European Symposium on Usable Security
PB - Association for Computing Machinery (ACM)
ER -