Follow
Shamal Faily
Shamal Faily
Defence Science and Technology Laboratory
Verified email at dstl.gov.uk - Homepage
Title
Cited by
Cited by
Year
Persona cases: a technique for grounding personas
S Faily, I Flechais
Proceedings of the 2011 annual conference on Human factors in computing …, 2011
1582011
Persona-centred information security awareness
D Ki-Aries, S Faily
computers & security 70, 663-674, 2017
1342017
Barry is not the weakest link: Eliciting Secure System Requirements with Personas
S Faily, I Fléchais
Proceedings of the 24th BCS Interaction Specialist Group Conference, 124-132, 2010
562010
A meta-model for usable secure requirements engineering
S Faily, I Fléchais
Proceedings of the 2010 ICSE Workshop on Software Engineering for Secure …, 2010
522010
Here's Johnny: A Methodology for Developing Attacker Personas
A Atzeni, C Cameroni, S Faily, J Lyle, I Flechais
Availability, Reliability and Security (ARES), 2011 Sixth International …, 2011
512011
Online reviews as first class artifacts in mobile app development
C Iacob, R Harrison, S Faily
Mobile Computing, Applications, and Services: 5th International Conference …, 2014
492014
The secret lives of assumptions: Developing and refining assumption personas for secure system design
S Faily, I Fléchais
Human-Centred Software Engineering, 111-118, 2010
462010
The webinos Project
C Fuhrhop, J Lyle, S Faily
41*
Exploring the gap between the student expectations and the reality of teamwork in undergraduate software engineering group projects
C Iacob, S Faily
Journal of systems and software 157, 110393, 2019
392019
Towards tool-support for usable secure requirements engineering with CAIRIS
S Faily, I Flechais
International Journal of Secure Software Engineering (IJSSE) 1 (3), 56-70, 2010
382010
The social psychology of cybersecurity
J McAlaney, J Taylor, S Faily
Psychologist 29 (9), 686-689, 2016
312016
Evaluating privacy-determining user privacy expectations on the web
C Pilton, S Faily, J Henriksen-Bulmer
computers & security 105, 102241, 2021
302021
Cross-platform access control for mobile web applications
J Lyle, S Monteleone, S Faily, D Patti, F Ricciato
2012 IEEE International Symposium on Policies for Distributed Systems and …, 2012
302012
Guidelines for integrating personas into software engineering tools
S Faily, J Lyle
Proceedings of the 5th ACM SIGCHI symposium on Engineering interactive …, 2013
292013
A framework of usable and secure system design
S Faily
Oxford University, UK, 2011
282011
Designing usable and secure software with IRIS and CAIRIS
S Faily
Springer International Publishing, 2018
262018
Requirements sensemaking using concept maps
S Faily, J Lyle, A Paul, A Atzeni, D Blomme, H Desruelle, K Bangalore
Human-Centered Software Engineering: 4th International Conference, HCSE 2012 …, 2012
262012
User&# x2212; Centered Information Security Policy Development in a Post&# x2212; Stuxnet World
S Faily, I Flechais
Fifth International Workshop on Secure Software Engineering, 2011
25*2011
Designing and aligning e-Science security culture with design
S Faily, I Fléchais
Information Management & Computer Security 18 (5), 339-349, 2010
232010
Tool-supporting data protection impact assessments with CAIRIS
J Coles, S Faily, D Ki-Aries
2018 IEEE 5th International Workshop on Evolving Security & Privacy …, 2018
222018
The system can't perform the operation now. Try again later.
Articles 1–20