Seguir
Shamal Faily
Shamal Faily
Defence Science and Technology Laboratory
Dirección de correo verificada de dstl.gov.uk - Página principal
Título
Citado por
Citado por
Año
Persona cases: a technique for grounding personas
S Faily, I Flechais
Proceedings of the 2011 annual conference on Human factors in computing …, 2011
1602011
Persona-centred information security awareness
D Ki-Aries, S Faily
Computers & security 70, 663-674, 2017
1352017
Barry is not the weakest link: Eliciting Secure System Requirements with Personas
S Faily, I Fléchais
Proceedings of the 24th BCS Interaction Specialist Group Conference, 124-132, 2010
562010
Online reviews as first class artifacts in mobile app development
C Iacob, R Harrison, S Faily
Mobile Computing, Applications, and Services: 5th International Conference …, 2014
522014
Here's Johnny: A Methodology for Developing Attacker Personas
A Atzeni, C Cameroni, S Faily, J Lyle, I Flechais
Availability, Reliability and Security (ARES), 2011 Sixth International …, 2011
522011
A meta-model for usable secure requirements engineering
S Faily, I Fléchais
Proceedings of the 2010 ICSE Workshop on Software Engineering for Secure …, 2010
512010
The secret lives of assumptions: Developing and refining assumption personas for secure system design
S Faily, I Fléchais
Human-Centred Software Engineering, 111-118, 2010
462010
The webinos Project
C Fuhrhop, J Lyle, S Faily
40*
Exploring the gap between the student expectations and the reality of teamwork in undergraduate software engineering group projects
C Iacob, S Faily
Journal of systems and software 157, 110393, 2019
392019
Towards tool-support for usable secure requirements engineering with CAIRIS
S Faily, I Flechais
International Journal of Secure Software Engineering (IJSSE) 1 (3), 56-70, 2010
372010
Evaluating privacy-determining user privacy expectations on the web
C Pilton, S Faily, J Henriksen-Bulmer
computers & security 105, 102241, 2021
302021
Cross-platform access control for mobile web applications
J Lyle, S Monteleone, S Faily, D Patti, F Ricciato
2012 IEEE International Symposium on Policies for Distributed Systems and …, 2012
302012
A framework of usable and secure system design
S Faily
Oxford University, UK, 2011
282011
Guidelines for integrating personas into software engineering tools
S Faily, J Lyle
Proceedings of the 5th ACM SIGCHI symposium on Engineering interactive …, 2013
272013
Requirements sensemaking using concept maps
S Faily, J Lyle, A Paul, A Atzeni, D Blomme, H Desruelle, K Bangalore
Human-Centered Software Engineering: 4th International Conference, HCSE 2012 …, 2012
262012
Designing usable and secure software with IRIS and CAIRIS
S Faily
Springer International Publishing, 2018
252018
User&# x2212; Centered Information Security Policy Development in a Post&# x2212; Stuxnet World
S Faily, I Flechais
Fifth International Workshop on Secure Software Engineering, 2011
23*2011
Designing and aligning e-Science security culture with design
S Faily, I Fléchais
Information Management & Computer Security 18 (5), 339-349, 2010
232010
Tool-supporting data protection impact assessments with CAIRIS
J Coles, S Faily, D Ki-Aries
2018 IEEE 5th International Workshop on Evolving Security & Privacy …, 2018
222018
Eliciting and visualising trust expectations using persona trust characteristics and goal models
S Faily, I Fléchais
Proceedings of the 6th International Workshop on Social Software Engineering …, 2014
222014
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20