From user-centred design to security : building attacker personas for digital banking. / Moeckel, Caroline.

NordiCHI '18 Proceedings of the 10th Nordic Conference on Human-Computer Interaction . Association for Computing Machinery (ACM), 2018. p. 892-897.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Published

Standard

From user-centred design to security : building attacker personas for digital banking. / Moeckel, Caroline.

NordiCHI '18 Proceedings of the 10th Nordic Conference on Human-Computer Interaction . Association for Computing Machinery (ACM), 2018. p. 892-897.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Harvard

Moeckel, C 2018, From user-centred design to security: building attacker personas for digital banking. in NordiCHI '18 Proceedings of the 10th Nordic Conference on Human-Computer Interaction . Association for Computing Machinery (ACM), pp. 892-897. https://doi.org/10.1145/3240167.3240241

APA

Moeckel, C. (2018). From user-centred design to security: building attacker personas for digital banking. In NordiCHI '18 Proceedings of the 10th Nordic Conference on Human-Computer Interaction (pp. 892-897). Association for Computing Machinery (ACM). https://doi.org/10.1145/3240167.3240241

Vancouver

Moeckel C. From user-centred design to security: building attacker personas for digital banking. In NordiCHI '18 Proceedings of the 10th Nordic Conference on Human-Computer Interaction . Association for Computing Machinery (ACM). 2018. p. 892-897 https://doi.org/10.1145/3240167.3240241

Author

Moeckel, Caroline. / From user-centred design to security : building attacker personas for digital banking. NordiCHI '18 Proceedings of the 10th Nordic Conference on Human-Computer Interaction . Association for Computing Machinery (ACM), 2018. pp. 892-897

BibTeX

@inproceedings{4a4f3cacf3634fa6b8b9811686f05562,
title = "From user-centred design to security: building attacker personas for digital banking",
abstract = "A 10-step process model to build attacker personas borrowed from user-centred design is proposed and applied to digital banking in this work, with a focus on the procedural approach. A data set of publicly available secondary data sources and grounded theory analysis are used to build a hypothesis (attacker taxonomy) to base the attacker personas on. Benefits of attacker personas, for example raising security awareness, are outlined as well as current drawbacks, like a lack of integration into the wider security management environment. Future research topics such as methodological advancement, stakeholder verification and collaboration are also mentioned.",
author = "Caroline Moeckel",
year = "2018",
month = sep,
day = "29",
doi = "10.1145/3240167.3240241",
language = "English",
pages = "892--897",
booktitle = "NordiCHI '18 Proceedings of the 10th Nordic Conference on Human-Computer Interaction",
publisher = "Association for Computing Machinery (ACM)",
address = "United States",

}

RIS

TY - GEN

T1 - From user-centred design to security

T2 - building attacker personas for digital banking

AU - Moeckel, Caroline

PY - 2018/9/29

Y1 - 2018/9/29

N2 - A 10-step process model to build attacker personas borrowed from user-centred design is proposed and applied to digital banking in this work, with a focus on the procedural approach. A data set of publicly available secondary data sources and grounded theory analysis are used to build a hypothesis (attacker taxonomy) to base the attacker personas on. Benefits of attacker personas, for example raising security awareness, are outlined as well as current drawbacks, like a lack of integration into the wider security management environment. Future research topics such as methodological advancement, stakeholder verification and collaboration are also mentioned.

AB - A 10-step process model to build attacker personas borrowed from user-centred design is proposed and applied to digital banking in this work, with a focus on the procedural approach. A data set of publicly available secondary data sources and grounded theory analysis are used to build a hypothesis (attacker taxonomy) to base the attacker personas on. Benefits of attacker personas, for example raising security awareness, are outlined as well as current drawbacks, like a lack of integration into the wider security management environment. Future research topics such as methodological advancement, stakeholder verification and collaboration are also mentioned.

U2 - 10.1145/3240167.3240241

DO - 10.1145/3240167.3240241

M3 - Conference contribution

SP - 892

EP - 897

BT - NordiCHI '18 Proceedings of the 10th Nordic Conference on Human-Computer Interaction

PB - Association for Computing Machinery (ACM)

ER -