ACKNOWLEDGEMENTS
The authors thank Prof. Ahmed Seffah
(Lappeenranta University of Technology) for his
numerous relevant remarks and suggestions on
preliminary versions of this paper. They thank also
warmly Dr. Jean-René Ruault for his strong
contribution to the last versions.
REFERENCES
Alexander, C, Ishikawa, S & Silverstein, M 1977, 'A
Pattern Language: Towns, Buildings, Construction',
Oxford University Press, New-York.
ANSSI, 2014, 'Résilience de lʼInternet français', Internet
resources http://www.ssi.gouv.fr/ [Accessed:
11/11/2015].
Bevan, N 2009, 'Extending quality in use to provide a
framework for usability measurement', In M. Kurosu
(ed), Human centered design, HCII 2009, pp.13–22,
Heidelberg, Germany, Springer-Verlag.
Birge, C 2009, 'Enhancing Research into Usable Privacy
and Security', SIGDOC 09: Proceedings of the 27th
ACM international conference on Design of
communication, October 2009.
Blakley, B, Heath, C and members of The Open Group
Security Forum 2004, 'Security design patterns',
Technical Report G031, The Open Group, Apr. 2004.
URL http://www.opengroup.org/publications/catalog/g
031.htm, [Accessed: 13/11/2015].
Braz, C, Seffah, A, Raihi, DM, 2007, 'Designing a Trade-
Off Between Usability and Security: A Metrics Based-
Model', In Proc. Interact, LNCS 4663, pp. 114–126.
Clarke, N & Furnell, S 2014, '8th Int’l Symposium on
Human Aspects of Information Security & Assurance
(HAISA 2014)', Nathan Clarke, Steven Furnell (eds),
Plymouth, UK, July 8-9, 2014. ISBN: 978-1-84102-
375-5.
Cranor, L 2006, 'Usable Privacy and Security', Lorrie
Cranor's courses, Internet resources http://cups.cs.cmu.
edu/courses/ups-sp06/ [Accessed: 13/11/2015].
Cranor, LF & Blase, U 2015, 'Usable Privacy and
Security', Lecturer materials, Courses January 2015,
Carnegie Mellon University, CyLab. http://cups.cs.cm
u.edu/courses/ups-sp14 [Accessed: 13/11/2015].
Cranor, LF & Garfinkel, S 2005, 'Security and Usability:
Designing Secure Systems that People Can Use', Ed.
O'Reilly, ISBN-13: 978-0596008277.
DCSSI 2009, 'Fiche d'expression rationnelle des objectifs
de sécurité', http://circulaire.legifrance.gouv.fr/pdf/200
9/04/cir_1982.pdf [Accessed: 14/11/2015].
Emery, E 1967, 'The next thirty years: concepts, methods
and anticipation', Human relations #20, pp. 199-237.
Ferrary, M 2014, 'Management des ressources humaines:
Marché du travail et acteurs stratégiques', Ed. Dunod,
Paris, France, ISBN-13: 978-2100713172.
French penal code 2015, 'De l'atteinte à la vie privée',
article 226-1, [Accessed: 14/11/2015].
Goudalo, W & Seret, D 2008, 'Towards the Engineering of
Security of Information Systems (ESIS): UML and the
IS Confidentiality', Proceedings at the Second
International Conference on Emerging Security
Information, Systems and Technologies, pp. 248-256,
IEEE Computer Society Washington, DC, USA.
Goudalo, W & Seret, D 2009, 'The Process of Engineering
of Security of Information Systems (ESIS): The
Formalism of Business Processes', SECURWARE
2009, 3rd Int’l Conf on Emerging Security
Information, Systems and Technologies, IARIA,
pp.105-113.
Goudalo, W 2011, 'Toward Engineering of Security of
Information Systems: The Security Acts', Proc. 5th
Int’l Conf. Emerging Security Information, Systems
and Technologies, IARIA, 2011, pp.44-50.
Hertzum, M, Clemmensen, T, Hornbæk, K, Kumar, J,
Qingxin, S & Yammiyavar, P 2007, 'Usability
constructs: A cross-cultural study of how users and
developers experience their use of information
systems', In Proceedings of HCI International 2007,
pp. 317–326, Beijing, China: Springer-Verlag.
Hollnagel, E, Woods, D, D & Leveson, N 2006,
'Resilience engineering. Concepts and precepts',
Ashgate, Aldershot.
IBM Corporation 2014, 'Understanding big data so you
can act with confidence', Doc. Ref. IMM14123USEN,
June 2014, http://www-01.ibm.com, [Accessed:
13/11/2015].
ISO 9241-110 2006, 'Ergonomics of human-system
interaction', Part 110 Dialogue principles.
ISO 9241-12 1998, 'Ergonomic requirements for office
work with visual display terminals (VDTs)', Part 12
Presentation of information.
ISO/IEC 2700x 2010, 'Information technology Security
techniques'.
KPMG International 2014, 'Managing the data challenge
in banking. Why is it so hard?', Document published
on June 2014, http://www.kpmg.com, [Accessed:
13/11/2015].
Laprie, JC 2008, “From dependability to resilience”, dans
Proceedings of the 38th Annual IEEE/IFIP
International Conference on Dependable Systems and
Networks (DSN 2008), Supplemental Volume,
Anchorage, USA, june 2008.
Larson, RC 2008, 'Service science: At the intersection of
management, social, and engineering sciences', IBM
Systems Journal, 47, pp.41–51.
Lewis, JR 2014, 'Usability: Lessons Learned … and Yet to
Be Learned', International Journal of Human-
Computer Interaction, 30:9, pp. 663-684.
Luzeaux, D 2011, 'Engineering Large-Scale Complex
Systems', In Luzeaux D., Ruault J.-R. & Wippler J.-L.
(eds), Complex Systems and Systems of Systems
Engineering, ISTE-Wiley, London, pp.3-84.
Mahatody, T, Sagar, M & Kolski, C 2010, 'State of the Art
on the Cognitive Walkthrough method, its variants and