Shamal Faily

Orcid: 0000-0002-2859-1143

Affiliations:
  • Bournemouth University, UK


According to our database1, Shamal Faily authored at least 79 papers between 2008 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Privacy Goals for the Data Lifecycle.
Future Internet, 2022

Assessing system of systems information security risk with OASoSIS.
Comput. Secur., 2022

Programming Language Evaluation Criteria for Safety-Critical Software in the Air Domain.
Proceedings of the IEEE International Symposium on Software Reliability Engineering Workshops, 2022

2021
Visualising personas as goal models to find security tensions.
Inf. Comput. Secur., 2021

Evaluating privacy - determining user privacy expectations on the web.
Comput. Secur., 2021

Integrated Design Framework for Facilitating Systems-Theoretic Process Analysis.
Proceedings of the Computer Security. ESORICS 2021 International Workshops, 2021

Use-Case Informed Task Analysis for Secure and Usable Design Solutions in Rail.
Proceedings of the Critical Information Infrastructures Security, 2021

2020
DPIA in Context: Applying DPIA to Assess Privacy Risks of Cyber Physical Systems.
Future Internet, 2020

The Impact of Undergraduate Mentorship on Student Satisfaction and Engagement, Teamwork Performance, and Team Dysfunction in a Software Engineering Group Project.
Proceedings of the 51st ACM Technical Symposium on Computer Science Education, 2020

Contextualisation of Data Flow Diagrams for Security Analysis.
Proceedings of the Graphical Models for Security - 7th International Workshop, 2020

Identifying Implicit Vulnerabilities Through Personas as Goal Models.
Proceedings of the Computer Security - ESORICS 2020 International Workshops, 2020

2019
Exploring the gap between the student expectations and the reality of teamwork in undergraduate software engineering group projects.
J. Syst. Softw., 2019

A normative decision-making model for cyber security.
Inf. Comput. Secur., 2019

Privacy risk assessment in context: A meta-model based on contextual integrity.
Comput. Secur., 2019

Usable and Secure Requirements Engineering with CAIRIS.
Proceedings of the 27th IEEE International Requirements Engineering Conference, 2019

Identifying Safety and Human Factors Issues in Rail Using IRIS and CAIRIS.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019

2018
System of Systems Characterisation assisting Security Risk Assessment.
Proceedings of the 13th Annual Conference on System of Systems Engineering, 2018

Assessing System of Systems Security Risk and Requirements with OASoSIS.
Proceedings of the 5th IEEE International Workshop on Evolving Security & Privacy Requirements Engineering, 2018

Tool-Supporting Data Protection Impact Assessments with CAIRIS.
Proceedings of the 5th IEEE International Workshop on Evolving Security & Privacy Requirements Engineering, 2018

Implementing GDPR in the Charity Sector: A Case Study.
Proceedings of the Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data, 2018

Redesigning an undergraduate software engineering course for a large cohort.
Proceedings of the 40th International Conference on Software Engineering: Software Engineering Education and Training, 2018

Rationalising Decision Making about Risk: A Normative Approach.
Proceedings of the Twelfth International Symposium on Human Aspects of Information Security & Assurance, 2018

Designing Usable and Secure Software with IRIS and CAIRIS
Springer, ISBN: 978-3-319-75492-5, 2018

2017
Persona-centred information security awareness.
Comput. Secur., 2017

Folk Risk Analysis: Factors Influencing Security Analysts' Interpretation of Risk.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017

From Requirements to Operation: Components for Risk Assessment in a Pervasive System of Systems.
Proceedings of the IEEE 25th International Requirements Engineering Conference Workshops, 2017

Design as Code: Facilitating Collaboration Between Usability and Security Engineers Using CAIRIS.
Proceedings of the IEEE 25th International Requirements Engineering Conference Workshops, 2017

System design considerations for risk perception.
Proceedings of the 11th International Conference on Research Challenges in Information Science, 2017

Re-framing "the AMN": A case study eliciting and modelling a System of Systems using the Afghan Mission Network.
Proceedings of the 11th International Conference on Research Challenges in Information Science, 2017

Using Extreme Characters to Teach Requirements Engineering.
Proceedings of the 30th IEEE Conference on Software Engineering Education and Training, 2017

Applying Contextual Integrity to Open Data Publishing.
Proceedings of the HCI 2017, 2017

2016
Finding and resolving security misusability with misusability cases.
Requir. Eng., 2016

Welcome to the Third Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE).
Proceedings of the 24th IEEE International Requirements Engineering Conference, 2016

MARAM: Tool Support for Mobile App Review Management.
Proceedings of the 8th EAI International Conference on Mobile Computing, 2016

The Application of useless Japanese Inventions for Requirements Elicitation in Information Security.
Proceedings of the HCI 2016, 2016

Persona-Driven Information Security Awareness.
Proceedings of the HCI 2016, 2016

Improving Human-Reviews Interaction: A Study of the Role, Use, and Place of Online Reviews.
Proceedings of the HCI 2016, 2016

Human-Centered Specification Exemplars for Critical Infrastructure Environments.
Proceedings of the HCI 2016, 2016

Ethical Hazards and Safeguards in Penetration Testing.
Proceedings of the HCI 2016, 2016

2015
Special section: software quality for mobile apps.
Softw. Qual. J., 2015

Engaging stakeholders during late stage security design with assumption personas.
Inf. Comput. Secur., 2015

Digital Rights Management: The Four Perspectives of Developers, Distributors, Users, and Lawyers.
Proceedings of the Ninth International Symposium on Human Aspects of Information Security & Assurance, 2015

Ethical Dilemmas and Dimensions in Penetration Testing.
Proceedings of the Ninth International Symposium on Human Aspects of Information Security & Assurance, 2015

"Water, Water, Every Where": Nuances for a Water Industry Critical Infrastructure Specification Exemplar.
Proceedings of the Critical Information Infrastructures Security, 2015

The mystery of security design.
Proceedings of the 2015 British HCI Conference, Lincoln, United Kingdom, July 13-17, 2015, 2015

Mitigating Circumstances in Cybercrime: A Position Paper.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

2014
Eliciting and visualising trust expectations using persona trust characteristics and goal models.
Proceedings of the 6th International Workshop on Social Software Engineering, 2014

Engaging Stakeholders in Security Design: An Assumption-Driven Approach.
Proceedings of the Eighth International Symposium on Human Aspects of Information Security & Assurance, 2014

Authorisation in Context: Incorporating Context-Sensitivity into an Access Control Framework.
Proceedings of the BCS-HCI 2014 Proceedings of the 28th International BCS Human Computer Interaction Conference, 2014

Evaluating the Implications of Attack and Security Patterns with Premortems.
Proceedings of the Cyberpatterns, 2014

2013
Formal Evaluation of Persona Trustworthiness with EUSTACE - (Extended Abstract).
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013

Extending the web to support personal network services.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

Online Reviews as First Class Artifacts in Mobile App Development.
Proceedings of the Mobile Computing, Applications, and Services, 2013

Continuous Integration for Web-Based Software Infrastructures: Lessons Learned on the webinos Project.
Proceedings of the Hardware and Software: Verification and Testing, 2013

Guidelines for integrating personas into software engineering tools.
Proceedings of the ACM SIGCHI Symposium on Engineering Interactive Computing Systems, 2013

Designing interactive secure system: chi 2013 special interest group.
Proceedings of the 2013 ACM SIGCHI Conference on Human Factors in Computing Systems, 2013

2012
The webinos project.
Proceedings of the 21st World Wide Web Conference, 2012

Cross-Platform Access Control for Mobile Web Applications.
Proceedings of the 2012 IEEE International Symposium on Policies for Distributed Systems and Networks, 2012

Model-driven architectural risk analysis using architectural and contextualised attack patterns.
Proceedings of the Model-Driven Security Workshop, 2012

Requirements Sensemaking Using Concept Maps.
Proceedings of the Human-Centered Software Engineering - 4th International Conference, 2012

Personal PKI for the Smart Device Era.
Proceedings of the Public Key Infrastructures, Services and Applications, 2012

On the Design and Development of webinos: A Distributed Mobile Application Middleware.
Proceedings of the Distributed Applications and Interoperable Systems, 2012

2011
A framework for usable and secure system design.
PhD thesis, 2011

Eliciting Policy Requirements for Critical National Infrastructure Using the IRIS Framework.
Int. J. Secur. Softw. Eng., 2011

Eliciting usable security requirements with misusability cases.
Proceedings of the RE 2011, 19th IEEE International Requirements Engineering Conference, Trento, Italy, August 29 2011, 2011

Bridging User-Centered Design and Requirements Engineering with GRL and Persona Cases.
Proceedings of the 5<sup>th</sup> International <i>i</i>* Workshop 2011, 2011

Persona cases: a technique for grounding personas.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

User-Centered Information Security Policy Development in a Post-Stuxnet World.
Proceedings of the Sixth International Conference on Availability, 2011

Here's Johnny: A Methodology for Developing Attacker Personas.
Proceedings of the Sixth International Conference on Availability, 2011

2010
Designing and Aligning e-Science Security Culture with Design.
Inf. Manag. Comput. Secur., 2010

Towards Tool-Support for Usable Secure Requirements Engineering with CAIRIS.
Int. J. Secur. Softw. Eng., 2010

To boldly go where invention isn't secure: applying security entrepreneurship to secure systems design.
Proceedings of the 2010 Workshop on New Security Paradigms, 2010

A meta-model for usable secure requirements engineering.
Proceedings of the ICSE Workshop on Software Engineering for Secure Systems, 2010

The Secret Lives of Assumptions: Developing and Refining Assumption Personas for Secure System Design.
Proceedings of the Human-Centred Software Engineering - Third International Conference, 2010

A Model of Security Culture for e-Science.
Proceedings of the South African Information Security Multi-Conference, 2010

Barry is not the weakest link: eliciting secure system requirements with personas.
Proceedings of the 2010 British Computer Society Conference on Human-Computer Interaction, 2010

Analysing and Visualising Security and Usability in IRIS.
Proceedings of the ARES 2010, 2010

2009
Context-Sensitive Requirements and Risk Management with IRIS.
Proceedings of the RE 2009, 17th IEEE International Requirements Engineering Conference, Atlanta, Georgia, USA, August 31, 2009

2008
Towards Requirements Engineering Practice for Professional End User Developers: A Case Study.
Proceedings of the Third International Workshop on Requirements Engineering Education and Training, 2008


  Loading...