Security fictions: Bridging speculative design and computer security

14Citations
Citations of this article
41Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

This paper begins with an observation: that threat identification is an intrinsically speculative practice. It requires imagining possible futures. Drawing on methods from speculative design, this paper presents an improvisational role-playing game designed to help software developers identify security threats. It deploys this game with seven software developers, who used the game to successfully identify diverse threats in their software. The insights from this deployment motivate future work on both the game itself and on organizational accounts of security. I call on the design research community to continue to apply its methods and perspectives to computer security, locating threat identification itself, like all speculation, as a site of social and political power.

Cite

CITATION STYLE

APA

Merrill, N. (2020). Security fictions: Bridging speculative design and computer security. In DIS 2020 - Proceedings of the 2020 ACM Designing Interactive Systems Conference (pp. 1727–1735). Association for Computing Machinery, Inc. https://doi.org/10.1145/3357236.3395451

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free