Security Fictions

Method Overview

A role-playing game designed for teams of software developers to identify various security threats in their software and how to better approach these issues.

Getting Started

Participants: Team (7 Participants)

Steps (from the publicly available academic paper):

  1. Introduce the game and its rules
  2. Proceed through the Impersonation Fiction scenario
  3. Proceed through the Stalking Fiction scenario
  4. Proceed through the Political Profiling Fiction scenario
  5. Discuss and reflect on the resolutions you came to 

This methods microsite is based off of analysis which is available in a preprint manuscript. Feel free to review our methodology and other details! We welcome your comments and feedback ! Please also use this form if you would like to suggest a method as an addition to the collection!