10. Wieringa, R., Maiden, N., Mead, N., Rolland, C.: Requirements Engineering Paper Classifi-
cation and Evaluation Criteria: a Proposal and a Discussion. Journal of Requirements Eng,
(2006)
Appendix
Literature Reviewed
-Beckles, B., Welch, V., Basney, J.: Mechanisms for increasing the usability of grid security. Int.
J. Human-Computer Studies 63, (2005) 74101
-Ben-asher, N., Meyer, J., Parmet, Y., Moeller, S., Englert, R.: Security and Usability Research
Using a Microworld Environment. Deutsche Telekom AG as part of the Telekom Laboratories,
(2009)
-Biddle, R., Brown, J., Chiasson, S., Martin, A.: Security Dialectics and Agile Software Devel-
opment. Position Paper for the 1st Software and Usable Security Aligned for Good Engineering
(SAUSAGE) Workshop, (2011)
-Braz, C., Robert, JM.: Security and Usability: The Case of the User Authentication Methods.
International Journal of Human-Computer Studies, (2006)
-Dewitt, A., Kuljis J.: Aligning Usability and Security: A Usability Study of Polaris. SOUPS ’06
Proceedings of the second symposium on Usable privacy and security, (2006)
- Egyed, A., Gr
¨
unbacher, P.: Identifying Requirements Conflicts and Cooperation: How Quality
Attributes and Automated Traceability Can Help. Focus persistent software attributes, (2004)
-Epstein, J.: Integrating Security & Usability Into the Software Development Lifecycle. Posi-
tion Paper for the 1st Software and Usable Security Aligned for Good Engineering (SAUSAGE)
Workshop, (2011)
-Ferreira, A., Rusu, C.: Roncagliolo, S.: Usability and Security Patterns. Second International
Conferences on Advances in Computer-Human Interactions, (2009)
-Fidas, C., Voyiatzis, A., Avouris, N.: When Security Meets Usability: A User-Centric Approach
on a Crossroads Priority Problem. 14th Panhellenic Conference on Informatics, (2010)
-Hahn, T., Kunz, T., Scheneider, M., Sven, V., Moeller, S., Englert, R.: Vulnerabilities through
Usability Pitfalls in Cloud Services: Security Problems due to Unveried Email Addresses. IEEE
11th International Conference on Trust, Security and Privacy in Computing and Communica-
tions, (2012)
-Josang, A., AlFayyadh, B., Grandison, T., AlZomai, M., McNamara, J.: Security Usa-bility Prin-
ciples for Vulnerability Analysis and Risk Assessment, 23rd Annual Computer Se-curity Appli-
cations Conference, (2007)
-Kainda, R., Flechais, I., Roscoe, A.: Security and Usability: Analysis and Evaluation, Interna-
tional Conference on Availability, Reliability and Security, (2010)
-Mairiza, D., Zowghi, D.: Constructing a Catalogue of conflicts among non-functional Re-quirements,
5th International Conference, ENASE, Athens, Greece, (2010)
-Minami, M., Suzaki, K., Okumura, T.: Security considered harmful A case study of trade-off be-
tween security and usability. The 8th Annual IEEE Consumer Communications and Net-working
Conference - Work in Progress (Short Papers), (2011)
-M
¨
ockel, C.: Usability and Security in EU E-Banking Systems towards an Integrated Evaluation
Framework. IEEE/IPSJ International Symposium on Applications and the Internet, (2011)
-Roth, V., Straub, T., Richter, K.: Security and usability engineering with particular attention to
electronic mail. International Journal of Human-Computer Studies, (2005)
-Prakash, A.: Security in Practice Security-Usability Chasm. Information Systems Security Lec-
ture Notes in Computer Science Volume 4812, (2007) 1-9
65