Skip to main content

Research Repository

Advanced Search

Browse


The webinos project. (2012)
Conference Proceeding
FUHRHOP, C., LYLE, J. and FAILY, S. 2012. The webinos project. In Proceedings of the 21st Annual conference on World Wide Web companion (WWW 2012 Companion), 16-20 April 2012, Lyon, France. New York: ACM [online], pages 263-266. Available from: https://doi.org/10.1145/2187980.2188024

This poster paper describes the webinos project and presents the architecture and security features developed in webinos. It highlights the main objectives and concepts of the project and describes the architecture derived to achive the objectives.

Case-based situation awareness. (2012)
Conference Proceeding
NWIABU, N., ALLISON, I., HOLT, P., LOWIT, P. and OYENEYIN, B. 2012. Case-based situation awareness. In Proceedings of the 2012 IEEE international multi-disciplinary conference on cognitive methods in situation awareness and decision support (CogSIMA 2012), 6-8 March 2012, New Orleans, USA. New York: IEEE [online], article number 6188388, pages 22-29. Available from: https://doi.org/10.1109/CogSIMA.2012.6188388

Situation-aware case-based decision support (SACBDS) systems comprise two distinct parts: situation awareness (SA) and case-based reasoning (CBR). The SA part keeps a finite history of the time space information of the domain and uses rules to interp... Read More about Case-based situation awareness..

User interface design for situation-aware decision support systems. (2012)
Conference Proceeding
NWIABU, N., ALLISON, I., HOLT, P., LOWIT, P. and OYENEYIN, B. 2012. User interface design for situation-aware decision support systems. In Proceedings of the 2012 IEEE international multi-disciplinary conference on cognitive methods in situation awareness and decision support (CogSIMA 2012), 6-8 March 2012, New Orleans, USA. New York: IEEE [online], article number 6188405, pages 332-339. Available from: https://doi.org/10.1109/CogSIMA.2012.6188405

Information recall about general situations incurs memory and cognitive loads on operators. Recognition of information for specific situations identified with users context and the state of the world is helpful to operators in performing tasks in com... Read More about User interface design for situation-aware decision support systems..

Influences on agile practice tailoring in enterprise software development. (2012)
Conference Proceeding
BASS, J.M. 2012. Influences on agile practice tailoring in enterprise software development. In Proceedings of Agile India 2012, 17-19 February 2012, Bengaluru, India. Los Alamitos: IEEE Computer Society [online], article number 6170020, pages 1-9. Available from: https://doi.org/10.1109/AgileIndia.2012.15

Agile development projects have become a reality in large enterprises using offshore development models. A case study involving seven international companies with offices in Bangalore, India, and London, UK was conducted, including interviews with 19... Read More about Influences on agile practice tailoring in enterprise software development..

Finding the hidden gems: recommending untagged music. (2011)
Conference Proceeding
HORSBURGH, B., CRAW, S., MASSIE, S. and BOSWELL, R. 2011. Finding the hidden gems: recommending untagged music. In Proceedings of the 22nd International joint conference on artificial intelligence (IJCAI-11), 16-22 July 2011, Barcelona, Spain. Palo Alto: AAAI Press [online], pages 2256-2261. Available from: https://doi.org/10.5591/978-1-57735-516-8/IJCAI11-376

We have developed a novel hybrid representation for Music Information Retrieval. Our representation is built by incorporating audio content into the tag space in a tag-track matrix, and then learning hybrid concepts using latent semantic analysis. We... Read More about Finding the hidden gems: recommending untagged music..

Here's Johnny: a methodology for developing attacker personas. (2011)
Conference Proceeding
ATZENI, A., CAMERONI, C., FAILY, S., LYLE, J. and FLÉCHAIS, I. 2011. Here's Johnny: a methodology for developing attacker personas. In Proceedings of the 6th International conference on availability, reliability and security (ARES 2011), 22-26 Aug 2011, Vienna, Austria. Los Alamitos: IEEE Computer Society [online], pages 722-727. Available from: https://doi.org/10.1109/ARES.2011.115

The adversarial element is an intrinsic part of the design of secure systems, but our assumptions about attackers and threat is often limited or stereotypical. Although there has been previous work on applying User-Centered Design on Persona developm... Read More about Here's Johnny: a methodology for developing attacker personas..

User-centered information security policy development in a post-Stuxnet world. (2011)
Conference Proceeding
FAILY, S. and FLÉCHAIS, I. 2011. User-centered information security policy development in a post-Stuxnet world. In Proceedings of the 5th International workshop on secure software engineering (SecSE 2011), part of the 6th International conference on availability, reliability and security (ARES 2011), 22-26 Aug 2011, Vienna, Austria. Los Alamitos: IEEE Computer Society [online], pages 716-721. Available from: https://doi.org/10.1109/ARES.2011.111

A balanced approach is needed for developing information security policies in Critical National Infrastructure (CNI) contexts. Requirements Engineering methods can facilitate such an approach, but these tend to focus on either security at the expense... Read More about User-centered information security policy development in a post-Stuxnet world..

Bridging user-centered design and requirements engineering with GRL and persona cases. (2011)
Conference Proceeding
FAILY, S. 2011. Bridging user-centered design and requirements engineering with GRL and persona cases. In Castro, J., Franch, X., Mylopoulos, J. and Yu, E. (eds.) Proceedings of the 5th International i* workshop (iStar 2011), 28-29 August 2011, Trento, Italy. CEUR workshop proceedings, 766. Aachen: CEUR-WS [online], pages 114-119. Available from: http://ceur-ws.org/Vol-766/paper20.pdf

Despite the large body of i* research, there has been comparatively little work on how goal-modelling techniques can help identify usability concerns. Recent work has considered how goal models might better integrate with User-Centered Design. This p... Read More about Bridging user-centered design and requirements engineering with GRL and persona cases..

Plan recommendation for well engineering. (2011)
Conference Proceeding
THOMSON, R., MASSIE, S., CRAW, S., AHRIZ, H. and MILLS, I. 2011. Plan recommendation for well engineering. In Mehrotra, K.G., Mohan, C.K., Oh, J.C., Varshney, P.K. and Ali, M. (eds.) Modern approaches in applied intelligence: proceedings of the 24th International conference on industrial, engineering and other applications of applied intelligent systems (IEA/AIE 2011), 28 June - 1 July 2011, Syracuse, USA. Lecture notes in computer science, 6704. Berlin: Springer [online], part II, pages 436-445. Available from: https://doi.org/10.1007/978-3-642-21827-9_45

Good project planning provides the basis for successful offshore well drilling projects. In this domain, planning occurs in two phases: an onshore phase develops a project plan; and an offshore phase implements the plan and tracks progress. The Perfo... Read More about Plan recommendation for well engineering..

Motivating all our students? (2011)
Conference Proceeding
BOUVIER, D., CARTER, J., CARDELL-OLIVER, R., HAMILTON, M., KURKOVSKY, S., MARKHAM, S., MCCLUNG, O.W., MCDERMOTT, R., RIEDESEL, C., SHI, J. and WHITE, S. 2011. Motivating all our students? In Proceedings of the 16th Innovation and technology in computer science education annual conference: working group reports (ITiCSE-WGR '11), 27-29 June 2011, Darmstadt, Germany. New York: ACM [online], pages 1-18. Available from: https://doi.org/10.1145/2078856.2078858

Academics expend a large amount of time and effort to sustain and enhance the motivation of undergraduate students. Typically based on a desire to ensure that all students achieve their full potential, approaches are based on an understanding that st... Read More about Motivating all our students?.

Persona cases: a technique for grounding personas. (2011)
Conference Proceeding
FAILY, S. and FLÉCHAIS, I. 2011. Persona cases: a technique for grounding personas. In Proceedings of the 29th Annual CHI conference on human factors in computing systems (CHI 2011), 7-12 May 2011, Vancouver, Canada. New York: ACM [online], pages 2267-2270. Available from: https://doi.org/10.1145/1978942.1979274

Personas are a popular technique in User-Centered Design, however their validity can be called into question. While the techniques used to developed personas and their integration with other design activities provide some measure of validity, a perso... Read More about Persona cases: a technique for grounding personas..

Situation awareness in context-aware case-based decision support. (2011)
Conference Proceeding
NWIABU, N., ALLISON, I., HOLT, P., LOWIT, P. and OYENEYIN, B. 2011. Situation awareness in context-aware case-based decision support. In Proceedings of the 2011 IEEE international multi-disciplinary conference on cognitive methods in situation awareness and decision support (CogSIMA 2011), 22-24 February 2011, Miami, USA. New York: IEEE [online], article number 5753761, pages 9-16. Available from: https://doi.org/10.1109/COGSIMA.2011.5753761

Humans naturally reuse recalled knowledge to solve problems and this includes understanding the context i.e. the information that identifies or characterizes these problems. For problems in complex and dynamic environments, providing effective soluti... Read More about Situation awareness in context-aware case-based decision support..

A model of security culture for e-science. (2011)
Conference Proceeding
FAILY, S. and FLÉCHAIS, I. 2011. A model of security culture for e-science. In Clarke, N., Furnell, S. and Von Solms, R. (eds.) Proceedings of the South African information security multi-conference (SAISMC 2010), 17-18 May 2010, Port Elizabeth, South Africa. Plymouth: University of Plymouth, pages 154-164.

There is a need to understand the cultural issues affecting security in large, distributed and heterogeneous systems; such systems are typified by e-Science projects. We present a model of security culture for e-Science, grounded both in the security... Read More about A model of security culture for e-science..

Assessing professional skills in engineering education. (2011)
Conference Proceeding
CAJANDER, Å., DANIELS, M., MCDERMOTT, R. and VON KONSKY, B.R. 2011. Assessing professional skills in engineering education. In Hamer, J. and Raadt, M. de (eds.) Proceedings of the 13th Australasian computing education conference (ACE 2011), 17-20 January 2011, Perth, Australia. Sydney: Conferences in research and practice in information technology (CRPIT) [online], 114, pages 145-154. Available from: http://crpit.com/Vol114.html.

In this paper, we report the results of introducing a face-to- face Peer Assisted Study Scheme (PASS) and an electronic Peer Assisted Study Scheme (ePASS) into a first year introductory programming unit, core to four undergraduate IT degrees. PASS is... Read More about Assessing professional skills in engineering education..

The secret lives of assumptions: developing and refining assumption personas for secure system design. (2010)
Conference Proceeding
FAILY, S. and FLÉCHAIS, I. 2010. The secret lives of assumptions: developing and refining assumption personas for secure system design. In Bernhaupt, R., Forbrig, P., Gulliksen, J. and Lárusdóttir, M. (eds.) Human-centred software engineering: proceedings of the 3rd International conference on human-centred software engineering (HCSE 2010), 14-15 October 2010, Reykjavik, Iceland. Lecture notes in computer science, 6409. Berlin: Springer [online], pages 111-118. Available from: https://doi.org/10.1007/978-3-642-16488-0_9

Personas are useful for obtaining an empirically grounded understanding of a secure system's user population, its contexts of use, and possible vulnerabilities and threats endangering it. Often, however, personas need to be partly derived from assump... Read More about The secret lives of assumptions: developing and refining assumption personas for secure system design..

Organizational factors shaping software process improvement in small-medium sized software teams: a multi-case analysis. (2010)
Conference Proceeding
ALLISON, I. 2010. Organizational factors shaping software process improvement in small-medium sized software teams: a multi-case analysis. In Proceedings of the 7th International conference on the quality of information and communications technology (QUATIC 2010), 29 September - 2 October 2010, Porto, Portugal. Los Alamitos: IEEE Computing Society [online], article number 5655656, pages 418-423. Available from: https://doi.org/10.1109/QUATIC.2010.81

Previous work looking at software process improvement (SPI) in small organizations has highlighted difficulties faced by small organizations in implementing SPI successfully, but there is little analysis to understand why this is from an organization... Read More about Organizational factors shaping software process improvement in small-medium sized software teams: a multi-case analysis..

Barry is not the weakest link: eliciting secure system requirements with personas. (2010)
Conference Proceeding
FAILY, S. and FLÉCHAIS, I. 2010. Barry is not the weakest link: eliciting secure system requirements with personas. In Proceedings of the 24th International BCS human computer interaction conference (HCI 2010): games are a serious business, 6-10 September 2010, Dundee, UK. Swindon: BCS, pages 124-132. Hosted on ScienceOpen [online]. Available from: https://doi.org/10.14236/ewic/HCI2010.17

Building secure and usable systems means specifying systems for the people using it and the tasks they carry out, rather than vice-versa. User-centred design approaches encourage an early focus on users and their contexts of use, but these need to be... Read More about Barry is not the weakest link: eliciting secure system requirements with personas..

To boldly go where invention isn't secure: applying security entrepreneurship to secure systems design. (2010)
Conference Proceeding
FAILY, S. and FLÉCHAIS, I. 2010. To boldly go where invention isn't secure: applying security entrepreneurship to secure systems design. In Proceedings of the 2010 New security paradigms workshop (NSPW 2010), 21-23 September 2010, Concord, USA. New York: ACM [online], pages 73-84. Available from: https://doi.org/10.1145/1900546.1900557

When designing secure systems, we are inundated with an eclectic mix of security and non-security requirements; this makes predicting a successful outcome from the universe of possible security design decisions a difficult problem. We propose augment... Read More about To boldly go where invention isn't secure: applying security entrepreneurship to secure systems design..

Multi-HDCS: solving DisCSPs with complex local problems cooperatively. (2010)
Conference Proceeding
LEE, D., ARANA, I., AHRIZ, H. and HUI, K. 2009. Multi-HDCS: solving DisCSPs with complex local problems cooperatively. In Huang, X.J., Ghorbani, A.A., Hacid, M.-S. and Yamaguchi, T. (eds.) Proceedings of the 2010 IEEE/WIC/ACM international conference on intelligent agent technology (IAT 2010), co-located with the 2010 IEEE/WIC/ACM international conference on web intelligence (WI 2010), and the joint conference workshops (WI-IAT Workshops 2010), 31 August - 3 September 2010, Toronto, Canada. Los Alamitos: IEEE Computer Society [online], volume 2, article number 5614767, pages 295-302. Available from: https://doi.org/10.1109/WI-IAT.2010.141

We propose Multi-HDCS, a new hybrid approach for solving Distributed CSPs with complex local problems. In Multi-HDCS, each agent concurrently: (i) runs a centralised systematic search for its complex local problem; (ii) participates in a distributed... Read More about Multi-HDCS: solving DisCSPs with complex local problems cooperatively..

Automatic features characterization from 3d facial images. (2010)
Conference Proceeding
ELYAN, E. and UGAIL, H. 2010. Automatic features characterization from 3d facial images. In Arabnia, H.R., Deligiannidis, L. and Solo, A.M.G. (eds.) Proceedings of the 14th International computer graphics and virtual reality conference (CGVR 2010), 12-15 July 2010, Las Vegas, USA. Georgia, USA: CSREA Press, pages 67-73.

This paper presents a novel and computationally fast method for automatic identification of symmetry profile from 3D facial images. The algorithm is based on the concepts of computational geometry which yield fast and accurate results. In order to de... Read More about Automatic features characterization from 3d facial images..