Skip to main content

Research Repository

Advanced Search

Proceedings of the 2008 Oxford University Computing Laboratory student conference. (2008)
Conference Proceeding
FAILY, S. and ŽIVNÝ, S. (eds.) Proceedings of the 2008 Oxford University Computing Laboratory student conference, October 2008, Oxford, UK. Oxford: Oxford University Computing Laboratory [online]. Available from: https://www.cs.ox.ac.uk/files/1328/RR-08-10.pdf

This conference serves two purposes. First, the event is a useful pedagogical exercise for all participants, from the conference committee and referees, to the presenters and the audience. For some presenters, the conference may be the first time the... Read More about Proceedings of the 2008 Oxford University Computing Laboratory student conference..

Towards requirements engineering practice for professional end user developers: a case study. (2008)
Conference Proceeding
FAILY, S. 2008. Towards requirements engineering practice for professional end user developers: a case study. In Proceedings of the 2008 Requirements engineering education and training conference (REET 2008), 8 September 2008, Barcelona, Spain. Washington, D.C.: IEEE Computer Society [online], pages 38-44. Available from: https://doi.org/10.1109/REET.2008.8

End-user development has received a lot of attention in the research community. Despite the importance of requirements engineering in the software development life-cycle, comparatively little exists in the way of prescriptive advice or case studies o... Read More about Towards requirements engineering practice for professional end user developers: a case study..

Making the invisible visible: a theory of security culture for secure and usable grids. (2008)
Presentation / Conference
FAILY, S. and FLÉCHAIS, I. 2008. Making the invisible visible: a theory of security culture for secure and usable grids. Presented at the 2008 UK e-science all hands meeting (AHM 2008), 8-11 September 2008, Edinburgh, UK.

This presentation addressed the concept of security culture and how it might be applied to grid-based collaborative environments. The presentation outlined some guidelines for fostering a healthy security culture and proposed ideas for future work.