Persona cases: a technique for grounding personas S Faily, I Flechais Proceedings of the 2011 annual conference on Human factors in computing …, 2011 | 147 | 2011 |
Persona-centred information security awareness D Ki-Aries, S Faily computers & security 70, 663-674, 2017 | 112 | 2017 |
Barry is not the weakest link: Eliciting Secure System Requirements with Personas S Faily, I Fléchais Proceedings of the 24th BCS Interaction Specialist Group Conference, 124-132, 2010 | 54 | 2010 |
A meta-model for usable secure requirements engineering S Faily, I Fléchais Proceedings of the 2010 ICSE Workshop on Software Engineering for Secure …, 2010 | 51 | 2010 |
Online reviews as first class artifacts in mobile app development C Iacob, R Harrison, S Faily Mobile Computing, Applications, and Services: 5th International Conference …, 2014 | 47 | 2014 |
Here's Johnny: A Methodology for Developing Attacker Personas A Atzeni, C Cameroni, S Faily, J Lyle, I Flechais Availability, Reliability and Security (ARES), 2011 Sixth International …, 2011 | 47 | 2011 |
The secret lives of assumptions: Developing and refining assumption personas for secure system design S Faily, I Fléchais Human-Centred Software Engineering, 111-118, 2010 | 45 | 2010 |
The webinos Project C Fuhrhop, J Lyle, S Faily | 40* | |
Towards tool-support for usable secure requirements engineering with CAIRIS S Faily, I Flechais International Journal of Secure Software Engineering (IJSSE) 1 (3), 56-70, 2010 | 39 | 2010 |
Cross-platform access control for mobile web applications J Lyle, S Monteleone, S Faily, D Patti, F Ricciato 2012 IEEE International Symposium on Policies for Distributed Systems and …, 2012 | 29 | 2012 |
A framework of usable and secure system design S Faily Oxford University, UK, 2011 | 28 | 2011 |
Guidelines for integrating personas into software engineering tools S Faily, J Lyle Proceedings of the 5th ACM SIGCHI symposium on Engineering interactive …, 2013 | 27 | 2013 |
Exploring the gap between the student expectations and the reality of teamwork in undergraduate software engineering group projects C Iacob, S Faily Journal of systems and software 157, 110393, 2019 | 26 | 2019 |
Designing Usable and Secure Software with IRIS and CAIRIS S Faily Springer International Publishing, 2018 | 25 | 2018 |
Evaluating privacy-determining user privacy expectations on the web C Pilton, S Faily, J Henriksen-Bulmer computers & security 105, 102241, 2021 | 23 | 2021 |
User&# x2212; Centered Information Security Policy Development in a Post&# x2212; Stuxnet World S Faily, I Flechais Fifth International Workshop on Secure Software Engineering, 2011 | 23* | 2011 |
Requirements sensemaking using concept maps S Faily, J Lyle, A Paul, A Atzeni, D Blomme, H Desruelle, K Bangalore Human-Centered Software Engineering: 4th International Conference, HCSE 2012 …, 2012 | 22 | 2012 |
Designing and aligning e-Science security culture with design S Faily, I Fléchais Information Management & Computer Security 18 (5), 339-349, 2010 | 22 | 2010 |
The social psychology of cybersecurity J McAlaney, J Taylor, S Faily Psychologist 29 (9), 686-689, 2016 | 19 | 2016 |
Eliciting and visualising trust expectations using persona trust characteristics and goal models S Faily, I Fléchais Proceedings of the 6th International Workshop on Social Software Engineering …, 2014 | 19 | 2014 |