Skip to main content

Research Repository

Advanced Search

All Outputs (10)

Proceedings of the 3rd IEEE international workshop on evolving security and privacy requirements engineering (ESPRE 2016). (2016)
Conference Proceeding
BECKERS, K., FAILY, S., LEE, S.-W. and MEAD, N. (eds.) 2016. Proceedings of the 3rd IEEE international workshop on evolving security and privacy requirements engineering (ESPRE 2016), co-located with the 24th IEEE international requirements engineering conference (RE 2016), 12 September 2016, Beijing, China. In Proceedings of the 2016 IEEE 24th international requirements engineering conference workshops. Los Alamitos: IEEE Computer Society [online], pages 53-91. Available from: https://ieeexplore.ieee.org/xpl/conhome/7801359/proceeding

ESPRE 2016 was a multi-disciplinary, one-day workshop, co-located with the RE'16 conference. The ESPRE workshop series brings together practitioners and researchers interested in security and privacy requirements. This workshop probed the interfaces... Read More about Proceedings of the 3rd IEEE international workshop on evolving security and privacy requirements engineering (ESPRE 2016)..

Human aspects of digital rights management: the perspective of content developers. [Journal Article] (2016)
Journal Article
FAVALE, M., MCDONALD, N., FAILY, S. and GATZIDIS, C. 2016. Human aspects of digital rights management: the perspective of content developers. SCRIPTed [online], 13(3), pages 289-304. Available from: https://doi.org/10.2966/scrip.130316.289

Legal norms and social behaviours are some of the human aspects surrounding the effectiveness and future of DRM security. Further exploration of these aspects would help unravel the complexities of the interaction between rights protection security a... Read More about Human aspects of digital rights management: the perspective of content developers. [Journal Article].

MARAM: tool support for mobile app review management. (2016)
Conference Proceeding
IACOB, C., FAILY, S. and HARRISON, R. 2016. MARAM: tool support for mobile app review management. In Kawsar, F., Zhang, P. and Musolesi, M. (eds.) Proceedings of the 8th International conference on mobile computing, applications and services (MobiCase 2016), 30 November - 1 December 2016, Cambridge, UK. Brussels: Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering (ICST), pages 42-50.

Mobile apps today have millions of user reviews available online. Such reviews cover a large broad of themes and are usually expressed in an informal language. They provide valuable information to developers, such as feature requests, bug reports, an... Read More about MARAM: tool support for mobile app review management..

Persona-driven information security awareness. (2016)
Conference Proceeding
KI-ARIES, D., FAILY, S. and BECKERS, K. 2016. Persona-driven information security awareness. In Proceedings of the 30th International BCS human computer interaction conference (HCI 2016): fusion, 11-15 July 2016, Poole, UK. Swindon: BCS [online], article number 97. Available from: https://doi.org/10.14236/ewic/HCI2016.97

Because human factors are a root cause of security breaches in many organisations, security awareness activities are often used to address problematic behaviours and improve security culture. Previous work has found that personas are useful for ident... Read More about Persona-driven information security awareness..

Ethical hazards and safeguards in penetration testing. (2016)
Conference Proceeding
FAILY, S., IACOB, C. and FIELD, S. 2016. Ethical hazards and safeguards in penetration testing. In Proceedings of the 30th International BCS human computer interaction conference (HCI 2016): fusion, 11-15 July 2016, Poole, UK. Swindon: BCS [online], article number 83. Available from: https://doi.org/10.14236/ewic/HCI2016.83

Penetration testing entails attacking a system to identify and report insecurity, but doing so without harming the system nor encroaching on the dignity of those affected by it. To improve the interaction between penetration testers and their process... Read More about Ethical hazards and safeguards in penetration testing..

Human-centered specification exemplars for critical infrastructure environments. (2016)
Conference Proceeding
FAILY, S., LYKOU, G., PARTRIDGE, A., GRITZALIS, D., MYLONAS, A. and KATOS, V. 2016. Human-centered specification exemplars for critical infrastructure environments. In Proceedings of the 30th International BCS human computer interaction conference (HCI 2016): fusion, 11-15 July 2016, Poole, UK. Swindon: BCS [online], article number 93. Available from: https://doi.org/10.14236/ewic/HCI2016.93

Specification models of critical infrastructure focus on parts of a larger environment. However, to consider the security of critical infrastructure systems, we need approaches for modelling the sum of these parts; these include people and activities... Read More about Human-centered specification exemplars for critical infrastructure environments..

Improving human-reviews interaction: a study of the role, use and place of online reviews. (2016)
Conference Proceeding
IACOB, C. and FAILY, S. 2016. Improving human-reviews interaction: a study of the role, use and place of online reviews. In Proceedings of the 30th International BCS human computer interaction conference (HCI 2016): fusion, 11-15 July 2016, Poole, UK. Swindon: BCS [online], article number 21. Available from: https://doi.org/10.14236/ewic/HCI2016.21

The use and benefits of online reviews are undeniable, yet the interaction means available for buyers when consulting reviews remain limited. This study aims to provide a better understanding of the role and use of online reviews, presenting a set of... Read More about Improving human-reviews interaction: a study of the role, use and place of online reviews..

The application of useless Japanese inventions for requirements elicitation in information security. (2016)
Conference Proceeding
PARTRIDGE, A. and FAILY, S. 2016. The application of useless Japanese inventions for requirements elicitation in information security. In Proceedings of the 30th International BCS human computer interaction conference (HCI 2016): fusion, 11-15 July 2016, Poole, UK. Swindon: BCS [online], article number 102. Available from: https://doi.org/10.14236/ewic/HCI2016.102

Rules of requirements elicitation in security are broken through the use of Chindōgu, by designing impractical security countermeasures in the first instance, then using these to create usable security requirements. We present a process to conceive t... Read More about The application of useless Japanese inventions for requirements elicitation in information security..

Gulfs of expectation: eliciting and verifying differences in trust expectations using personas (2016)
Journal Article
FAILY, S., POWER, D. and FLÉCHAIS, I. 2016. Gulfs of expectation: eliciting and verifying differences in trust expectations using personas. Journal of trust management [online], 3, article number 4. Available from: https://doi.org/10.1186/s40493-016-0025-9

Personas are a common tool used in Human Computer Interaction to represent the needs and expectations of a system's stakeholders, but they are also grounded in large amounts of qualitative data. Our aim is to make use of this data to anticipate the d... Read More about Gulfs of expectation: eliciting and verifying differences in trust expectations using personas.

Water, water, every where: nuances for a water industry critical infrastructure specification exemplar. (2016)
Conference Proceeding
FAILY, S., STERGIOPOULOS, G., KATOS, V. and GRITZALIS, D. 2016. Water, water, every where: nuances for a water industry critical infrastructure specification exemplar. In Rome, E., Theocharidou, M. and Wolthusen, S. (eds.) Critical information infrastructures security: revised selected papers from the proceedings of the 10th International conference on critical information infrastructures security (CRITIS 2015), 5-7 October 2015, Berlin, Germany. Lecture notes in computer science, 9578. Cham: Springer [online], pages 243-246. Available from: https://doi.org/10.1007/978-3-319-33331-1_20

The water infrastructure is critical to human life, but little attention has been paid to the nuances of the water industry. Without such attention, evaluating security innovation in this domain without compromising the productivity goals when delive... Read More about Water, water, every where: nuances for a water industry critical infrastructure specification exemplar..