Abstract
This paper begins with an observation: that threat identification is an intrinsically speculative practice. It requires imagining possible futures. Drawing on methods from speculative design, this paper presents an improvisational role-playing game designed to help software developers identify security threats. It deploys this game with seven software developers, who used the game to successfully identify diverse threats in their software. The insights from this deployment motivate future work on both the game itself and on organizational accounts of security. I call on the design research community to continue to apply its methods and perspectives to computer security, locating threat identification itself, like all speculation, as a site of social and political power.
Author supplied keywords
Cite
CITATION STYLE
Merrill, N. (2020). Security fictions: Bridging speculative design and computer security. In DIS 2020 - Proceedings of the 2020 ACM Designing Interactive Systems Conference (pp. 1727–1735). Association for Computing Machinery, Inc. https://doi.org/10.1145/3357236.3395451
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.