Shamal Faily
Shamal Faily
Defence Science and Technology Laboratory
Email verificata su - Home page
Citata da
Citata da
Persona cases: a technique for grounding personas
S Faily, I Flechais
Proceedings of the 2011 annual conference on Human factors in computing …, 2011
Persona-centred information security awareness
D Ki-Aries, S Faily
computers & security 70, 663-674, 2017
Barry is not the weakest link: Eliciting Secure System Requirements with Personas
S Faily, I Fléchais
Proceedings of the 24th BCS Interaction Specialist Group Conference, 124-132, 2010
A meta-model for usable secure requirements engineering
S Faily, I Fléchais
Proceedings of the 2010 ICSE Workshop on Software Engineering for Secure …, 2010
Online reviews as first class artifacts in mobile app development
C Iacob, R Harrison, S Faily
Mobile Computing, Applications, and Services: 5th International Conference …, 2014
Here's Johnny: A Methodology for Developing Attacker Personas
A Atzeni, C Cameroni, S Faily, J Lyle, I Flechais
Availability, Reliability and Security (ARES), 2011 Sixth International …, 2011
The secret lives of assumptions: Developing and refining assumption personas for secure system design
S Faily, I Fléchais
Human-Centred Software Engineering, 111-118, 2010
The webinos Project
C Fuhrhop, J Lyle, S Faily
Towards tool-support for usable secure requirements engineering with CAIRIS
S Faily, I Flechais
International Journal of Secure Software Engineering (IJSSE) 1 (3), 56-70, 2010
Cross-platform access control for mobile web applications
J Lyle, S Monteleone, S Faily, D Patti, F Ricciato
2012 IEEE International Symposium on Policies for Distributed Systems and …, 2012
A framework of usable and secure system design
S Faily
Oxford University, UK, 2011
Guidelines for integrating personas into software engineering tools
S Faily, J Lyle
Proceedings of the 5th ACM SIGCHI symposium on Engineering interactive …, 2013
Exploring the gap between the student expectations and the reality of teamwork in undergraduate software engineering group projects
C Iacob, S Faily
Journal of systems and software 157, 110393, 2019
Designing Usable and Secure Software with IRIS and CAIRIS
S Faily
Springer International Publishing, 2018
Evaluating privacy-determining user privacy expectations on the web
C Pilton, S Faily, J Henriksen-Bulmer
computers & security 105, 102241, 2021
User&# x2212; Centered Information Security Policy Development in a Post&# x2212; Stuxnet World
S Faily, I Flechais
Fifth International Workshop on Secure Software Engineering, 2011
Requirements sensemaking using concept maps
S Faily, J Lyle, A Paul, A Atzeni, D Blomme, H Desruelle, K Bangalore
Human-Centered Software Engineering: 4th International Conference, HCSE 2012 …, 2012
Designing and aligning e-Science security culture with design
S Faily, I Fléchais
Information Management & Computer Security 18 (5), 339-349, 2010
The social psychology of cybersecurity
J McAlaney, J Taylor, S Faily
Psychologist 29 (9), 686-689, 2016
Eliciting and visualising trust expectations using persona trust characteristics and goal models
S Faily, I Fléchais
Proceedings of the 6th International Workshop on Social Software Engineering …, 2014
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20