Persona cases: a technique for grounding personas S Faily, I Flechais Proceedings of the 2011 annual conference on Human factors in computing …, 2011 | 172 | 2011 |
Persona-centred information security awareness D Ki-Aries, S Faily Computers & security 70, 663-674, 2017 | 151 | 2017 |
Barry is not the weakest link: Eliciting Secure System Requirements with Personas S Faily, I Fléchais Proceedings of the 24th BCS Interaction Specialist Group Conference, 124-132, 2010 | 61 | 2010 |
Online reviews as first class artifacts in mobile app development C Iacob, R Harrison, S Faily Mobile Computing, Applications, and Services: 5th International Conference …, 2014 | 56 | 2014 |
Here's Johnny: A Methodology for Developing Attacker Personas A Atzeni, C Cameroni, S Faily, J Lyle, I Flechais Availability, Reliability and Security (ARES), 2011 Sixth International …, 2011 | 56 | 2011 |
A meta-model for usable secure requirements engineering S Faily, I Fléchais Proceedings of the 2010 ICSE Workshop on Software Engineering for Secure …, 2010 | 52 | 2010 |
Exploring the gap between the student expectations and the reality of teamwork in undergraduate software engineering group projects C Iacob, S Faily Journal of systems and software 157, 110393, 2019 | 49 | 2019 |
The secret lives of assumptions: Developing and refining assumption personas for secure system design S Faily, I Fléchais Human-Centred Software Engineering, 111-118, 2010 | 48 | 2010 |
The webinos Project C Fuhrhop, J Lyle, S Faily | 42* | |
Evaluating privacy-determining user privacy expectations on the web C Pilton, S Faily, J Henriksen-Bulmer computers & security 105, 102241, 2021 | 37 | 2021 |
The social psychology of cybersecurity J McAlaney, J Taylor, S Faily Psychologist 29 (9), 686-689, 2016 | 37 | 2016 |
Towards tool-support for usable secure requirements engineering with CAIRIS S Faily, I Flechais International Journal of Secure Software Engineering (IJSSE) 1 (3), 56-70, 2010 | 37 | 2010 |
Guidelines for integrating personas into software engineering tools S Faily, J Lyle Proceedings of the 5th ACM SIGCHI symposium on Engineering interactive …, 2013 | 32 | 2013 |
Cross-platform access control for mobile web applications J Lyle, S Monteleone, S Faily, D Patti, F Ricciato 2012 IEEE International Symposium on Policies for Distributed Systems and …, 2012 | 31 | 2012 |
Designing usable and secure software with IRIS and CAIRIS S Faily Springer International Publishing, 2018 | 28 | 2018 |
A framework of usable and secure system design S Faily Oxford University, UK, 2011 | 28 | 2011 |
Requirements sensemaking using concept maps S Faily, J Lyle, A Paul, A Atzeni, D Blomme, H Desruelle, K Bangalore Human-Centered Software Engineering: 4th International Conference, HCSE 2012 …, 2012 | 27 | 2012 |
The impact of undergraduate mentorship on student satisfaction and engagement, teamwork performance, and team dysfunction in a software engineering group project C Iacob, S Faily Proceedings of the 51st ACM Technical Symposium on Computer Science …, 2020 | 26 | 2020 |
Usability and security by design: a case study in research and development S Faily, J Lyle, I Fléchais, A Simpson Internet Society, 2015 | 24 | 2015 |
User&# x2212; Centered Information Security Policy Development in a Post&# x2212; Stuxnet World S Faily, I Flechais Fifth International Workshop on Secure Software Engineering, 2011 | 24* | 2011 |