Re-evaluation of PhishI game and its utilisation in eliciting security requirements.
Rubia FatimaAffan YasinLin LiuJianmin WangPublished in: Int. J. Inf. Comput. Secur. (2024)
Keyphrases
- security requirements
- information security
- security analysis
- access control
- smart card
- reference models
- security policies
- security properties
- security model
- security concerns
- security problems
- security mechanisms
- case study
- mobile commerce
- databases
- requirements engineering
- security issues
- e government
- security patterns
- secure electronic