Follow
Shamal Faily
Shamal Faily
Defence Science and Technology Laboratory
Verified email at dstl.gov.uk - Homepage
Title
Cited by
Cited by
Year
Persona cases: a technique for grounding personas
S Faily, I Flechais
Proceedings of the 2011 annual conference on Human factors in computing …, 2011
1722011
Persona-centred information security awareness
D Ki-Aries, S Faily
Computers & security 70, 663-674, 2017
1512017
Barry is not the weakest link: Eliciting Secure System Requirements with Personas
S Faily, I Fléchais
Proceedings of the 24th BCS Interaction Specialist Group Conference, 124-132, 2010
612010
Online reviews as first class artifacts in mobile app development
C Iacob, R Harrison, S Faily
Mobile Computing, Applications, and Services: 5th International Conference …, 2014
562014
Here's Johnny: A Methodology for Developing Attacker Personas
A Atzeni, C Cameroni, S Faily, J Lyle, I Flechais
Availability, Reliability and Security (ARES), 2011 Sixth International …, 2011
562011
A meta-model for usable secure requirements engineering
S Faily, I Fléchais
Proceedings of the 2010 ICSE Workshop on Software Engineering for Secure …, 2010
522010
Exploring the gap between the student expectations and the reality of teamwork in undergraduate software engineering group projects
C Iacob, S Faily
Journal of systems and software 157, 110393, 2019
492019
The secret lives of assumptions: Developing and refining assumption personas for secure system design
S Faily, I Fléchais
Human-Centred Software Engineering, 111-118, 2010
482010
The webinos Project
C Fuhrhop, J Lyle, S Faily
42*
Evaluating privacy-determining user privacy expectations on the web
C Pilton, S Faily, J Henriksen-Bulmer
computers & security 105, 102241, 2021
372021
The social psychology of cybersecurity
J McAlaney, J Taylor, S Faily
Psychologist 29 (9), 686-689, 2016
372016
Towards tool-support for usable secure requirements engineering with CAIRIS
S Faily, I Flechais
International Journal of Secure Software Engineering (IJSSE) 1 (3), 56-70, 2010
372010
Guidelines for integrating personas into software engineering tools
S Faily, J Lyle
Proceedings of the 5th ACM SIGCHI symposium on Engineering interactive …, 2013
322013
Cross-platform access control for mobile web applications
J Lyle, S Monteleone, S Faily, D Patti, F Ricciato
2012 IEEE International Symposium on Policies for Distributed Systems and …, 2012
312012
Designing usable and secure software with IRIS and CAIRIS
S Faily
Springer International Publishing, 2018
282018
A framework of usable and secure system design
S Faily
Oxford University, UK, 2011
282011
Requirements sensemaking using concept maps
S Faily, J Lyle, A Paul, A Atzeni, D Blomme, H Desruelle, K Bangalore
Human-Centered Software Engineering: 4th International Conference, HCSE 2012 …, 2012
272012
The impact of undergraduate mentorship on student satisfaction and engagement, teamwork performance, and team dysfunction in a software engineering group project
C Iacob, S Faily
Proceedings of the 51st ACM Technical Symposium on Computer Science …, 2020
262020
Usability and security by design: a case study in research and development
S Faily, J Lyle, I Fléchais, A Simpson
Internet Society, 2015
242015
User&# x2212; Centered Information Security Policy Development in a Post&# x2212; Stuxnet World
S Faily, I Flechais
Fifth International Workshop on Secure Software Engineering, 2011
24*2011
The system can't perform the operation now. Try again later.
Articles 1–20