Follow
Shamal Faily
Shamal Faily
Defence Science and Technology Laboratory
Verified email at dstl.gov.uk - Homepage
Title
Cited by
Cited by
Year
Persona cases: a technique for grounding personas
S Faily, I Flechais
Proceedings of the 2011 annual conference on Human factors in computing …, 2011
1712011
Persona-centred information security awareness
D Ki-Aries, S Faily
Computers & security 70, 663-674, 2017
1502017
Barry is not the weakest link: Eliciting Secure System Requirements with Personas
S Faily, I Fléchais
Proceedings of the 24th BCS Interaction Specialist Group Conference, 124-132, 2010
612010
Here's Johnny: A Methodology for Developing Attacker Personas
A Atzeni, C Cameroni, S Faily, J Lyle, I Flechais
Availability, Reliability and Security (ARES), 2011 Sixth International …, 2011
562011
Online reviews as first class artifacts in mobile app development
C Iacob, R Harrison, S Faily
Mobile Computing, Applications, and Services: 5th International Conference …, 2014
552014
A meta-model for usable secure requirements engineering
S Faily, I Fléchais
Proceedings of the 2010 ICSE Workshop on Software Engineering for Secure …, 2010
522010
The secret lives of assumptions: Developing and refining assumption personas for secure system design
S Faily, I Fléchais
Human-Centred Software Engineering, 111-118, 2010
482010
Exploring the gap between the student expectations and the reality of teamwork in undergraduate software engineering group projects
C Iacob, S Faily
Journal of systems and software 157, 110393, 2019
472019
The webinos Project
C Fuhrhop, J Lyle, S Faily
41*
Towards tool-support for usable secure requirements engineering with CAIRIS
S Faily, I Flechais
International Journal of Secure Software Engineering (IJSSE) 1 (3), 56-70, 2010
372010
Evaluating privacy-determining user privacy expectations on the web
C Pilton, S Faily, J Henriksen-Bulmer
computers & security 105, 102241, 2021
362021
The social psychology of cybersecurity
J McAlaney, J Taylor, S Faily
Psychologist 29 (9), 686-689, 2016
362016
Guidelines for integrating personas into software engineering tools
S Faily, J Lyle
Proceedings of the 5th ACM SIGCHI symposium on Engineering interactive …, 2013
322013
Cross-platform access control for mobile web applications
J Lyle, S Monteleone, S Faily, D Patti, F Ricciato
2012 IEEE International Symposium on Policies for Distributed Systems and …, 2012
312012
A framework of usable and secure system design
S Faily
Oxford University, UK, 2011
282011
Designing usable and secure software with IRIS and CAIRIS
S Faily
Springer International Publishing, 2018
272018
Requirements sensemaking using concept maps
S Faily, J Lyle, A Paul, A Atzeni, D Blomme, H Desruelle, K Bangalore
Human-Centered Software Engineering: 4th International Conference, HCSE 2012 …, 2012
272012
The impact of undergraduate mentorship on student satisfaction and engagement, teamwork performance, and team dysfunction in a software engineering group project
C Iacob, S Faily
Proceedings of the 51st ACM Technical Symposium on Computer Science …, 2020
252020
Usability and security by design: a case study in research and development
S Faily, J Lyle, I Fléchais, A Simpson
Internet Society, 2015
242015
User&# x2212; Centered Information Security Policy Development in a Post&# x2212; Stuxnet World
S Faily, I Flechais
Fifth International Workshop on Secure Software Engineering, 2011
24*2011
The system can't perform the operation now. Try again later.
Articles 1–20