Shamal Faily
Shamal Faily
Defence Science and Technology Laboratory
Verified email at - Homepage
Cited by
Cited by
Persona cases: a technique for grounding personas
S Faily, I Flechais
Proceedings of the 2011 annual conference on Human factors in computing …, 2011
Persona-centred information security awareness
D Ki-Aries, S Faily
Computers & security 70, 663-674, 2017
Barry is not the weakest link: Eliciting Secure System Requirements with Personas
S Faily, I Fléchais
Proceedings of the 24th BCS Interaction Specialist Group Conference, 124-132, 2010
Here's Johnny: A Methodology for Developing Attacker Personas
A Atzeni, C Cameroni, S Faily, J Lyle, I Flechais
Availability, Reliability and Security (ARES), 2011 Sixth International …, 2011
Online reviews as first class artifacts in mobile app development
C Iacob, R Harrison, S Faily
Mobile Computing, Applications, and Services: 5th International Conference …, 2014
A meta-model for usable secure requirements engineering
S Faily, I Fléchais
Proceedings of the 2010 ICSE Workshop on Software Engineering for Secure …, 2010
The secret lives of assumptions: Developing and refining assumption personas for secure system design
S Faily, I Fléchais
Human-Centred Software Engineering, 111-118, 2010
Exploring the gap between the student expectations and the reality of teamwork in undergraduate software engineering group projects
C Iacob, S Faily
Journal of systems and software 157, 110393, 2019
The webinos Project
C Fuhrhop, J Lyle, S Faily
Towards tool-support for usable secure requirements engineering with CAIRIS
S Faily, I Flechais
International Journal of Secure Software Engineering (IJSSE) 1 (3), 56-70, 2010
Evaluating privacy-determining user privacy expectations on the web
C Pilton, S Faily, J Henriksen-Bulmer
computers & security 105, 102241, 2021
Cross-platform access control for mobile web applications
J Lyle, S Monteleone, S Faily, D Patti, F Ricciato
2012 IEEE International Symposium on Policies for Distributed Systems and …, 2012
Guidelines for integrating personas into software engineering tools
S Faily, J Lyle
Proceedings of the 5th ACM SIGCHI symposium on Engineering interactive …, 2013
A framework of usable and secure system design
S Faily
Oxford University, UK, 2011
Designing usable and secure software with IRIS and CAIRIS
S Faily
Springer International Publishing, 2018
Requirements sensemaking using concept maps
S Faily, J Lyle, A Paul, A Atzeni, D Blomme, H Desruelle, K Bangalore
Human-Centered Software Engineering: 4th International Conference, HCSE 2012 …, 2012
User&# x2212; Centered Information Security Policy Development in a Post&# x2212; Stuxnet World
S Faily, I Flechais
Fifth International Workshop on Secure Software Engineering, 2011
Designing and aligning e-Science security culture with design
S Faily, I Fléchais
Information Management & Computer Security 18 (5), 339-349, 2010
Tool-supporting data protection impact assessments with CAIRIS
J Coles, S Faily, D Ki-Aries
2018 IEEE 5th International Workshop on Evolving Security & Privacy …, 2018
Eliciting and visualising trust expectations using persona trust characteristics and goal models
S Faily, I Fléchais
Proceedings of the 6th International Workshop on Social Software Engineering …, 2014
The system can't perform the operation now. Try again later.
Articles 1–20