HCD Case Study for the Information Security Training System

被引:0
|
作者
Kondo, Akira [1 ]
Yoshii, Makoto [1 ]
机构
[1] Hitachi Intermedix Co Ltd, Chiyoda Ku, 2-1-5 Kandanishikicho, Tokyo 1010054, Japan
来源
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We proposed organization persona as persona scenario method for business to business content creation process. This paper introduces three projects cases which were based on HCD process. We improved design process practically and enhanced persona for organization as company.
引用
收藏
页码:979 / +
页数:2
相关论文
共 50 条
  • [21] Implementation of Information Security in the EU Information Systems An Estonian Case Study
    Jarvsoo, Maris
    Norta, Alexander
    Tsap, Valentyna
    Pappel, Ingrid
    Draheim, Dirk
    CHALLENGES AND OPPORTUNITIES IN THE DIGITAL ERA, 2018, 11195 : 150 - 163
  • [22] Computer forensics, information security and law: A case study
    Herath, A
    Herath, S
    Samarasinghe, P
    Herath, J
    Herath, S
    FIRST INTERNATIONAL WORKSHOP ON SYSTEMATIC APPROACHES TO DIGITAL FORENSIC ENGINEERING, PROCEEDINGS, 2005, : 135 - 141
  • [23] Developing an Information Security Policy: A Case Study Approach
    Alqahtani, Fayez Hussain
    4TH INFORMATION SYSTEMS INTERNATIONAL CONFERENCE (ISICO 2017), 2017, 124 : 691 - 697
  • [24] A Case Study on Risk Management of Enterprise Information Security
    Huang, Rengen
    Zhu, Zhen
    2015 2nd International Conference on Creative Education (ICCE 2015), Pt 2, 2015, 11 : 201 - 208
  • [25] Democracy, culture and information security: A case study in Zanzibar
    Shaaban, Hussein
    Conrad, Marc
    Information Management and Computer Security, 2013, 21 (03): : 191 - 201
  • [26] Information Security Culture Model. A Case Study
    Marchand-Nino, William-Rogelio
    Huaman Samaniego, Hector
    2021 XLVII LATIN AMERICAN COMPUTING CONFERENCE (CLEI 2021), 2021,
  • [27] The Management of IT Security with a Continuous Security Monitoring System - A Case Study
    Tinca, Andrei
    METALURGIA INTERNATIONAL, 2013, 18 : 22 - 27
  • [28] Introduction of a Tool-based Continuous Information Security Management System: An Exploratory Case Study
    Brunner, Michael
    Mussmann, Andrea
    Breu, Ruth
    2018 IEEE 18TH INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY COMPANION (QRS-C), 2018, : 483 - 490
  • [29] Neuroevolution For Effective Information Security Training
    Anjaria, Kushal
    Mishra, Arun
    2017 INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND ITS ENGINEERING APPLICATIONS (ICSOFTCOMP), 2017,
  • [30] Integrated Implementation of Service and Information Security Management System (case study: State Polytehnic of Lampung)
    Putra, Septafiansyah Dwi
    Sutikno, Sarwono
    Rosmansyah, Yusep
    Asrowardi, Imam
    2014 INTERNATIONAL CONFERENCE ON ICT FOR SMART SOCIETY (ICISS), 2014, : 185 - 191