Ivan Flechais

Orcid: 0000-0002-3620-0843

According to our database1, Ivan Flechais authored at least 49 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Useful shortcuts: Using design heuristics for consent and permission in smart home devices.
Int. J. Hum. Comput. Stud., February, 2024

2023
"It becomes more of an abstract idea, this privacy" - Informing the design for communal privacy experiences in smart homes.
Int. J. Hum. Comput. Stud., December, 2023

Digital Deception: Generative Artificial Intelligence in Social Engineering and Phishing.
CoRR, 2023

Examining Power Dynamics and User Privacy in Smart Technology Use Among Jordanian Households.
Proceedings of the 32nd USENIX Security Symposium, 2023

Practical Cybersecurity Ethics: Mapping CyBOK to Ethical Concerns.
Proceedings of the 2023 New Security Paradigms Workshop, 2023

2022
Data Protection at a Discount: Investigating the UX of Data Protection from User, Designer, and Business Leader Perspectives.
Proc. ACM Hum. Comput. Interact., 2022

Exploring Bystanders' Privacy Concerns with Smart Homes in Jordan.
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022

2021
"It did not give me an option to decline": A Longitudinal Analysis of the User Experience of Security and Privacy in Smart Home Products.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021

2020
Innovation Inaction or In Action? The Role of User Experience in the Security and Privacy Design of Smart Home Cameras.
Proceedings of the Sixteenth Symposium on Usable Privacy and Security, 2020

"Alexa, Are You Spying on Me?": Exploring the Effect of User Experience on the Security and Privacy of Smart Speaker Users.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2020

"Security should be there by default": Investigating how journalists perceive and respond to risks from the Internet of Things.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

Further Exploring Communal Technology Use in Smart Homes: Social Expectations.
Proceedings of the Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems, 2020

Factoring User Experience into the Security and Privacy Design of Smart Home Devices: A Case Study.
Proceedings of the Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems, 2020

2019
Informing The Future of Data Protection in Smart Homes.
CoRR, 2019

Exploring Communal Technology Use in the Home.
Proceedings of the Halfway to the Future Symposium 2019, 2019

2018
Informal Support Networks: an investigation into Home Data Security Practices.
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018

2017
"If It's Urgent or It Is Stopping Me from Doing Something, Then I Might Just Go Straight at It": A Study into Home Data Security Decisions.
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017

2016
Finding and resolving security misusability with misusability cases.
Requir. Eng., 2016

2015
Security Practices for Households Bank Customers in the Kingdom of Saudi Arabia.
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015

Experiences in Developing and Delivering a Programme of Part-Time Education in Software and Systems Security.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

2014
Eliciting and visualising trust expectations using persona trust characteristics and goal models.
Proceedings of the 6th International Workshop on Social Software Engineering, 2014

Authorisation in Context: Incorporating Context-Sensitivity into an Access Control Framework.
Proceedings of the BCS-HCI 2014 Proceedings of the 28th International BCS Human Computer Interaction Conference, 2014

2013
Formal Evaluation of Persona Trustworthiness with EUSTACE - (Extended Abstract).
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013

In the balance in Saudi Arabia: security, privacy and trust.
Proceedings of the 2013 ACM SIGCHI Conference on Human Factors in Computing Systems, 2013

2012
Personal PKI for the Smart Device Era.
Proceedings of the Public Key Infrastructures, Services and Applications, 2012

On the Design and Development of webinos: A Distributed Mobile Application Middleware.
Proceedings of the Distributed Applications and Interoperable Systems, 2012

2011
Eliciting Policy Requirements for Critical National Infrastructure Using the IRIS Framework.
Int. J. Secur. Softw. Eng., 2011

Eliciting usable security requirements with misusability cases.
Proceedings of the RE 2011, 19th IEEE International Requirements Engineering Conference, Trento, Italy, August 29 2011, 2011

Persona cases: a technique for grounding personas.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

User-Centered Information Security Policy Development in a Post-Stuxnet World.
Proceedings of the Sixth International Conference on Availability, 2011

Here's Johnny: A Methodology for Developing Attacker Personas.
Proceedings of the Sixth International Conference on Availability, 2011

2010
Designing and Aligning e-Science Security Culture with Design.
Inf. Manag. Comput. Secur., 2010

Towards Tool-Support for Usable Secure Requirements Engineering with CAIRIS.
Int. J. Secur. Softw. Eng., 2010

Secure and Usable Out-Of-Band Channels for <i>Ad Hoc</i> Mobile Device Interactions.
Proceedings of the Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 2010

Two heads are better than one: security and usability of device associations in group scenarios.
Proceedings of the Sixth Symposium on Usable Privacy and Security, 2010

To boldly go where invention isn't secure: applying security entrepreneurship to secure systems design.
Proceedings of the 2010 Workshop on New Security Paradigms, 2010

A meta-model for usable secure requirements engineering.
Proceedings of the ICSE Workshop on Software Engineering for Secure Systems, 2010

The Secret Lives of Assumptions: Developing and Refining Assumption Personas for Secure System Design.
Proceedings of the Human-Centred Software Engineering - Third International Conference, 2010

A Model of Security Culture for e-Science.
Proceedings of the South African Information Security Multi-Conference, 2010

Barry is not the weakest link: eliciting secure system requirements with personas.
Proceedings of the 2010 British Computer Society Conference on Human-Computer Interaction, 2010

Security and Usability: Analysis and Evaluation.
Proceedings of the ARES 2010, 2010

Analysing and Visualising Security and Usability in IRIS.
Proceedings of the ARES 2010, 2010

2009
Stakeholder involvement, motivation, responsibility, communication: How to design usable security in e-Science.
Int. J. Hum. Comput. Stud., 2009

Usability and security of out-of-band channels in secure device pairing protocols.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

Context-Sensitive Requirements and Risk Management with IRIS.
Proceedings of the RE 2009, 17th IEEE International Requirements Engineering Conference, Atlanta, Georgia, USA, August 31, 2009

2007
Integrating security and usability into the requirements and design process.
Int. J. Electron. Secur. Digit. Forensics, 2007

2005
The development of secure and usable systems.
PhD thesis, 2005

Divide and conquer: the role of trust and assurance in the design of secure socio-technical systems.
Proceedings of the New Security Paradigms Workshop 2005, 2005

2003
Bringing security home: a process for developing secure and usable systems.
Proceedings of the New Security Paradigms Workshop 2003, 2003


  Loading...