A role-playing game designed for teams of software developers to identify various security threats in their software and how to better approach these issues.
Participants: Team (7 Participants)
Steps (from the publicly available academic paper):
- Introduce the game and its rules
- Proceed through the Impersonation Fiction scenario
- Proceed through the Stalking Fiction scenario
- Proceed through the Political Profiling Fiction scenario
- Discuss and reflect on the resolutions you came to