The Personal Information Security Assistant

Roeland H.P. Kegel

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    8 Downloads (Pure)

    Abstract

    The human element is often found to be the weakest link in the information security chain. The Personal Information Security Assistant project aims to address this by improving the privacy and security awareness of end-users and by aligning the user's personal IT environment to the user's security requirements. It does this by elicitation of a user's privacy and security requirements (risk appetite) as well as a user's risk perception. The PISA then takes action by aligning the user's requirements and perceptions, thereby improving user awareness regarding privacy and security. This article outlines the research questions, methodology and current results associated with the PISA project.
    Original languageEnglish
    Title of host publication2015 IEEE 23rd International Requirements Engineering Conference (RE)
    Place of PublicationUnited States
    PublisherIEEE
    Pages393-397
    Number of pages5
    ISBN (Print)978-146736905-3
    DOIs
    Publication statusPublished - Aug 2015
    Event23rd IEEE International Requirements Engineering Conference, RE 2015 - Ottawa, Canada
    Duration: 24 Aug 201528 Aug 2015
    Conference number: 23
    http://www.re15.org/

    Publication series

    NameIEEE International Requirements Engineering Conference (RE)
    PublisherIEEE
    Volume2015
    ISSN (Print)1090-705X

    Conference

    Conference23rd IEEE International Requirements Engineering Conference, RE 2015
    Abbreviated titleRE
    Country/TerritoryCanada
    CityOttawa
    Period24/08/1528/08/15
    Internet address

    Keywords

    • Risk appetite
    • SCS-cybersecurity
    • Privacy
    • Risk perception
    • Security
    • User requirements elicitation
    • Perusasive technology

    Fingerprint

    Dive into the research topics of 'The Personal Information Security Assistant'. Together they form a unique fingerprint.

    Cite this