关注
Shamal Faily
Shamal Faily
Defence Science and Technology Laboratory
在 dstl.gov.uk 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Persona cases: a technique for grounding personas
S Faily, I Flechais
Proceedings of the 2011 annual conference on Human factors in computing …, 2011
1672011
Persona-centred information security awareness
D Ki-Aries, S Faily
Computers & security 70, 663-674, 2017
1392017
Barry is not the weakest link: Eliciting Secure System Requirements with Personas
S Faily, I Fléchais
Proceedings of the 24th BCS Interaction Specialist Group Conference, 124-132, 2010
592010
Here's Johnny: A Methodology for Developing Attacker Personas
A Atzeni, C Cameroni, S Faily, J Lyle, I Flechais
Availability, Reliability and Security (ARES), 2011 Sixth International …, 2011
542011
A meta-model for usable secure requirements engineering
S Faily, I Fléchais
Proceedings of the 2010 ICSE Workshop on Software Engineering for Secure …, 2010
522010
Online reviews as first class artifacts in mobile app development
C Iacob, R Harrison, S Faily
Mobile Computing, Applications, and Services: 5th International Conference …, 2014
512014
The secret lives of assumptions: Developing and refining assumption personas for secure system design
S Faily, I Fléchais
Human-Centred Software Engineering, 111-118, 2010
472010
Exploring the gap between the student expectations and the reality of teamwork in undergraduate software engineering group projects
C Iacob, S Faily
Journal of systems and software 157, 110393, 2019
462019
The webinos Project
C Fuhrhop, J Lyle, S Faily
41*
Towards tool-support for usable secure requirements engineering with CAIRIS
S Faily, I Flechais
International Journal of Secure Software Engineering (IJSSE) 1 (3), 56-70, 2010
372010
The social psychology of cybersecurity
J McAlaney, J Taylor, S Faily
Psychologist 29 (9), 686-689, 2016
362016
Evaluating privacy-determining user privacy expectations on the web
C Pilton, S Faily, J Henriksen-Bulmer
computers & security 105, 102241, 2021
332021
Cross-platform access control for mobile web applications
J Lyle, S Monteleone, S Faily, D Patti, F Ricciato
2012 IEEE International Symposium on Policies for Distributed Systems and …, 2012
312012
Guidelines for integrating personas into software engineering tools
S Faily, J Lyle
Proceedings of the 5th ACM SIGCHI symposium on Engineering interactive …, 2013
302013
A framework of usable and secure system design
S Faily
Oxford University, UK, 2011
282011
Requirements sensemaking using concept maps
S Faily, J Lyle, A Paul, A Atzeni, D Blomme, H Desruelle, K Bangalore
Human-Centered Software Engineering: 4th International Conference, HCSE 2012 …, 2012
272012
Designing usable and secure software with IRIS and CAIRIS
S Faily
Springer International Publishing, 2018
262018
The impact of undergraduate mentorship on student satisfaction and engagement, teamwork performance, and team dysfunction in a software engineering group project
C Iacob, S Faily
Proceedings of the 51st ACM Technical Symposium on Computer Science …, 2020
252020
Designing and aligning e-Science security culture with design
S Faily, I Fléchais
Information Management & Computer Security 18 (5), 339-349, 2010
242010
User&# x2212; Centered Information Security Policy Development in a Post&# x2212; Stuxnet World
S Faily, I Flechais
Fifth International Workshop on Secure Software Engineering, 2011
23*2011
系统目前无法执行此操作,请稍后再试。
文章 1–20