Persona cases: a technique for grounding personas S Faily, I Flechais Proceedings of the 2011 annual conference on Human factors in computing …, 2011 | 155 | 2011 |
Persona-centred information security awareness D Ki-Aries, S Faily computers & security 70, 663-674, 2017 | 128 | 2017 |
Barry is not the weakest link: Eliciting Secure System Requirements with Personas S Faily, I Fléchais Proceedings of the 24th BCS Interaction Specialist Group Conference, 124-132, 2010 | 56 | 2010 |
A meta-model for usable secure requirements engineering S Faily, I Fléchais Proceedings of the 2010 ICSE Workshop on Software Engineering for Secure …, 2010 | 52 | 2010 |
Here's Johnny: A Methodology for Developing Attacker Personas A Atzeni, C Cameroni, S Faily, J Lyle, I Flechais Availability, Reliability and Security (ARES), 2011 Sixth International …, 2011 | 51 | 2011 |
Online reviews as first class artifacts in mobile app development C Iacob, R Harrison, S Faily Mobile Computing, Applications, and Services: 5th International Conference …, 2014 | 49 | 2014 |
The secret lives of assumptions: Developing and refining assumption personas for secure system design S Faily, I Fléchais Human-Centred Software Engineering, 111-118, 2010 | 46 | 2010 |
The webinos Project C Fuhrhop, J Lyle, S Faily | 40* | |
Towards tool-support for usable secure requirements engineering with CAIRIS S Faily, I Flechais International Journal of Secure Software Engineering (IJSSE) 1 (3), 56-70, 2010 | 38 | 2010 |
Exploring the gap between the student expectations and the reality of teamwork in undergraduate software engineering group projects C Iacob, S Faily Journal of systems and software 157, 110393, 2019 | 37 | 2019 |
The social psychology of cybersecurity J McAlaney, J Taylor, S Faily Psychologist 29 (9), 686-689, 2016 | 30 | 2016 |
Cross-platform access control for mobile web applications J Lyle, S Monteleone, S Faily, D Patti, F Ricciato 2012 IEEE International Symposium on Policies for Distributed Systems and …, 2012 | 29 | 2012 |
Guidelines for integrating personas into software engineering tools S Faily, J Lyle Proceedings of the 5th ACM SIGCHI symposium on Engineering interactive …, 2013 | 28 | 2013 |
A framework of usable and secure system design S Faily Oxford University, UK, 2011 | 28 | 2011 |
Evaluating privacy-determining user privacy expectations on the web C Pilton, S Faily, J Henriksen-Bulmer computers & security 105, 102241, 2021 | 27 | 2021 |
Designing usable and secure software with IRIS and CAIRIS S Faily Springer International Publishing, 2018 | 26 | 2018 |
Requirements sensemaking using concept maps S Faily, J Lyle, A Paul, A Atzeni, D Blomme, H Desruelle, K Bangalore Human-Centered Software Engineering: 4th International Conference, HCSE 2012 …, 2012 | 25 | 2012 |
User&# x2212; Centered Information Security Policy Development in a Post&# x2212; Stuxnet World S Faily, I Flechais Fifth International Workshop on Secure Software Engineering, 2011 | 25* | 2011 |
Designing and aligning e-Science security culture with design S Faily, I Fléchais Information Management & Computer Security 18 (5), 339-349, 2010 | 23 | 2010 |
Eliciting and visualising trust expectations using persona trust characteristics and goal models S Faily, I Fléchais Proceedings of the 6th International Workshop on Social Software Engineering …, 2014 | 20 | 2014 |