ACKNOWLEDGEMENTS 
The authors thank Prof. Ahmed Seffah 
(Lappeenranta University of Technology) for his 
numerous relevant remarks and suggestions on 
preliminary versions of this paper. They thank also 
warmly Dr. Jean-René Ruault for his strong 
contribution to the last versions. 
REFERENCES 
Alexander, C, Ishikawa, S & Silverstein, M 1977, 'A 
Pattern Language: Towns, Buildings, Construction', 
Oxford University Press, New-York. 
ANSSI, 2014, 'Résilience de lʼInternet français', Internet 
resources http://www.ssi.gouv.fr/ [Accessed: 
11/11/2015]. 
Bevan, N 2009, 'Extending quality in use to provide a 
framework for usability measurement', In M. Kurosu 
(ed), Human centered design, HCII 2009, pp.13–22, 
Heidelberg, Germany, Springer-Verlag. 
Birge, C 2009, 'Enhancing Research into Usable Privacy 
and Security', SIGDOC 09: Proceedings of the 27th 
ACM international conference on Design of 
communication, October 2009. 
Blakley, B, Heath, C and members of The Open Group 
Security Forum 2004, 'Security design patterns', 
Technical Report G031, The Open Group, Apr. 2004. 
URL http://www.opengroup.org/publications/catalog/g 
031.htm, [Accessed: 13/11/2015]. 
Braz, C, Seffah, A, Raihi, DM, 2007, 'Designing a Trade-
Off Between Usability and Security: A Metrics Based-
Model', In Proc. Interact, LNCS 4663, pp. 114–126. 
Clarke, N & Furnell, S 2014, '8th Int’l Symposium on 
Human Aspects of Information Security & Assurance 
(HAISA 2014)', Nathan Clarke, Steven Furnell (eds), 
Plymouth, UK, July 8-9, 2014. ISBN: 978-1-84102-
375-5. 
Cranor, L 2006, 'Usable Privacy and Security', Lorrie 
Cranor's courses, Internet resources http://cups.cs.cmu. 
edu/courses/ups-sp06/ [Accessed: 13/11/2015]. 
Cranor, LF & Blase, U 2015, 'Usable Privacy and 
Security', Lecturer materials, Courses January 2015, 
Carnegie Mellon University, CyLab. http://cups.cs.cm 
u.edu/courses/ups-sp14  [Accessed: 13/11/2015]. 
Cranor, LF & Garfinkel, S 2005, 'Security and Usability: 
Designing Secure Systems that People Can Use', Ed. 
O'Reilly, ISBN-13: 978-0596008277. 
DCSSI 2009, 'Fiche d'expression rationnelle des objectifs 
de sécurité', http://circulaire.legifrance.gouv.fr/pdf/200 
9/04/cir_1982.pdf  [Accessed: 14/11/2015]. 
Emery, E 1967, 'The next thirty years: concepts, methods 
and anticipation', Human relations #20, pp. 199-237. 
Ferrary, M 2014, 'Management des ressources humaines: 
Marché du travail et acteurs stratégiques', Ed. Dunod, 
Paris, France, ISBN-13: 978-2100713172. 
French penal code 2015, 'De l'atteinte à la vie privée', 
article 226-1, [Accessed: 14/11/2015]. 
Goudalo, W & Seret, D 2008, 'Towards the Engineering of 
Security of Information Systems (ESIS): UML and the 
IS Confidentiality', Proceedings at the Second 
International Conference on Emerging Security 
Information, Systems and Technologies, pp. 248-256, 
IEEE Computer Society Washington, DC, USA. 
Goudalo, W & Seret, D 2009, 'The Process of Engineering 
of Security of Information Systems (ESIS): The 
Formalism of Business Processes', SECURWARE 
2009, 3rd Int’l Conf on Emerging Security 
Information, Systems and Technologies, IARIA, 
pp.105-113. 
Goudalo, W 2011, 'Toward Engineering of Security of 
Information Systems: The Security Acts', Proc. 5th 
Int’l Conf. Emerging Security Information, Systems 
and Technologies, IARIA, 2011, pp.44-50. 
Hertzum, M, Clemmensen, T, Hornbæk, K, Kumar, J, 
Qingxin, S & Yammiyavar, P 2007, 'Usability 
constructs: A cross-cultural study of how users and 
developers experience their use of information 
systems', In Proceedings of HCI International 2007, 
pp. 317–326, Beijing, China: Springer-Verlag. 
Hollnagel, E, Woods, D, D & Leveson, N 2006, 
'Resilience engineering. Concepts and precepts', 
Ashgate, Aldershot. 
IBM Corporation 2014, 'Understanding big data so you 
can act with confidence', Doc. Ref. IMM14123USEN, 
June 2014, http://www-01.ibm.com, [Accessed: 
13/11/2015]. 
ISO 9241-110 2006, 'Ergonomics of human-system 
interaction', Part 110 Dialogue principles. 
ISO 9241-12 1998, 'Ergonomic requirements for office 
work with visual display terminals (VDTs)', Part 12 
Presentation of information. 
ISO/IEC 2700x 2010, 'Information technology Security 
techniques'. 
KPMG International 2014, 'Managing the data challenge 
in banking. Why is it so hard?', Document published 
on June 2014, http://www.kpmg.com, [Accessed: 
13/11/2015]. 
Laprie, JC 2008, “From dependability to resilience”, dans 
Proceedings of the 38th Annual IEEE/IFIP 
International Conference on Dependable Systems and 
Networks (DSN 2008),  Supplemental Volume, 
Anchorage, USA, june 2008. 
Larson, RC 2008, 'Service science: At the intersection of 
management, social, and engineering sciences', IBM 
Systems Journal, 47, pp.41–51. 
Lewis, JR 2014, 'Usability: Lessons Learned … and Yet to 
Be Learned', International Journal of Human-
Computer Interaction, 30:9, pp. 663-684. 
Luzeaux, D 2011, 'Engineering Large-Scale Complex 
Systems', In Luzeaux D., Ruault J.-R. & Wippler J.-L. 
(eds),  Complex Systems and Systems of Systems 
Engineering, ISTE-Wiley, London, pp.3-84. 
Mahatody, T, Sagar, M & Kolski, C 2010, 'State of the Art 
on the Cognitive Walkthrough method, its variants and