Skip to main content

Research Repository

Advanced Search

All Outputs (14)

The secret lives of assumptions: developing and refining assumption personas for secure system design. (2010)
Conference Proceeding
FAILY, S. and FLÉCHAIS, I. 2010. The secret lives of assumptions: developing and refining assumption personas for secure system design. In Bernhaupt, R., Forbrig, P., Gulliksen, J. and Lárusdóttir, M. (eds.) Human-centred software engineering: proceedings of the 3rd International conference on human-centred software engineering (HCSE 2010), 14-15 October 2010, Reykjavik, Iceland. Lecture notes in computer science, 6409. Berlin: Springer [online], pages 111-118. Available from: https://doi.org/10.1007/978-3-642-16488-0_9

Personas are useful for obtaining an empirically grounded understanding of a secure system's user population, its contexts of use, and possible vulnerabilities and threats endangering it. Often, however, personas need to be partly derived from assump... Read More about The secret lives of assumptions: developing and refining assumption personas for secure system design..

Office buildings' daylighting design in hot arid regions: forms, codes and occupants' point of view. (2010)
Conference Proceeding
BELAKEHAL, A., BENNADJI, A. and AOUL, K. 2010. Office buildings' daylighting design in hot arid regions: forms, codes and occupants' point of view. In Abdo, A.M.A. and Akash, B.A. (eds.) Proceedings of the 2010 International engineering conference on hot arid regions (IECHAR-2010): challenges, technologies and opportunities, 1-2 March 2010, Al-Ahsa, Saudi Arabia. Al-Ahsa: King Faisal University, pages 343-347.

In hot and arid regions, contemporary designers need more daylighting related information in order to achieve an environmental friendly and energy efficient architecture design. This paper presents the results of a Post Occupancy Evaluation research... Read More about Office buildings' daylighting design in hot arid regions: forms, codes and occupants' point of view..

The role of networking in the growth processes of family firms: an international study. (2010)
Conference Proceeding
JACK, S., DRAKOPOULOU DODD, S. and ANDERSON, A.R. 2010. The role of networking in the growth processes of family firms: an international study. In Hadjielias, E. and Barton, T. (eds.) Proceedings of the 10th Annual world family business research conference (IFERA 2010): long term perspectives on family business: theory, practice, policy, 6-9 July 2010, Lancaster, UK. Lancaster: Lancaster University Management School.

The paper aims to investigate the role of networks in the growth processes of family firms. The study adds to two main stream of literature, drawing together theoretical developments from the family firm realm and networking theory, to investigate th... Read More about The role of networking in the growth processes of family firms: an international study..

Organizational factors shaping software process improvement in small-medium sized software teams: a multi-case analysis. (2010)
Conference Proceeding
ALLISON, I. 2010. Organizational factors shaping software process improvement in small-medium sized software teams: a multi-case analysis. In Proceedings of the 7th International conference on the quality of information and communications technology (QUATIC 2010), 29 September - 2 October 2010, Porto, Portugal. Los Alamitos: IEEE Computing Society [online], article number 5655656, pages 418-423. Available from: https://doi.org/10.1109/QUATIC.2010.81

Previous work looking at software process improvement (SPI) in small organizations has highlighted difficulties faced by small organizations in implementing SPI successfully, but there is little analysis to understand why this is from an organization... Read More about Organizational factors shaping software process improvement in small-medium sized software teams: a multi-case analysis..

Integration of CAD/tool path data for 5-axis STEP-NC machining of free form/irrregular controured surfaces. (2010)
Conference Proceeding
ANBALAGAN, A. 2010. Integration of CAD/tool path for 5 axis STEP-NC machining of free form/irrregular contoured surfaces. In Katalinic, B. (ed.) Proceedings of 21st Danube Adria Association for Automation and Manufacturing (DAAAM) international symposium 2010: intelligent manufacturing and automation, 20-23 October 2010, Zadar, Croatia. Vienna: DAAAM International [online], article ID 617, pages 1233-1235. Available from: https://www.daaam.info/Downloads/Pdfs/proceedings/proceedings_2010/24469_Symp_1_head.pdf

This research paper presents the work on feature recognition, tool path data generation and integration with STEP-NC (AP-238 format) for features having Free form/Irregular Contoured Surfaces(s) (FICS). Initially, the FICS features are modelled/impor... Read More about Integration of CAD/tool path data for 5-axis STEP-NC machining of free form/irrregular controured surfaces..

Feature recognition and tool path generation for 5 axis STEP-NC machining of free form/irregular contoured surfaces. (2010)
Conference Proceeding
ANBALAGAN, A. 2010. Feature recognition and tool path generation for 5 axis STEP-NC machining of free form/irregular contoured surfaces. In Katalinic, B. (ed.) Proceedings of 21st Danube Adria Association for Automation and Manufacturing (DAAAM) international symposium 2010: intelligent manufacturing and automation, 20-23 October 2010, Zadar, Croatia. Vienna: DAAAM International [online], article ID 618, pages 1235-1236. Available from: https://www.daaam.info/Downloads/Pdfs/proceedings/proceedings_2010/24469_Symp_2_head.pdf

This research paper presents a five step algorithm to generate tool paths for machining Free form / Irregular Contoured Surface(s) (FICS) by adopting STEP-NC (AP-238) format. In the first step, a parametrized CAD model with FICS is created or importe... Read More about Feature recognition and tool path generation for 5 axis STEP-NC machining of free form/irregular contoured surfaces..

To boldly go where invention isn't secure: applying security entrepreneurship to secure systems design. (2010)
Conference Proceeding
FAILY, S. and FLÉCHAIS, I. 2010. To boldly go where invention isn't secure: applying security entrepreneurship to secure systems design. In Proceedings of the 2010 New security paradigms workshop (NSPW 2010), 21-23 September 2010, Concord, USA. New York: ACM [online], pages 73-84. Available from: https://doi.org/10.1145/1900546.1900557

When designing secure systems, we are inundated with an eclectic mix of security and non-security requirements; this makes predicting a successful outcome from the universe of possible security design decisions a difficult problem. We propose augment... Read More about To boldly go where invention isn't secure: applying security entrepreneurship to secure systems design..

Barry is not the weakest link: eliciting secure system requirements with personas. (2010)
Conference Proceeding
FAILY, S. and FLÉCHAIS, I. 2010. Barry is not the weakest link: eliciting secure system requirements with personas. In Proceedings of the 24th International BCS human computer interaction conference (HCI 2010): games are a serious business, 6-10 September 2010, Dundee, UK. Swindon: BCS, pages 124-132. Hosted on ScienceOpen [online]. Available from: https://doi.org/10.14236/ewic/HCI2010.17

Building secure and usable systems means specifying systems for the people using it and the tasks they carry out, rather than vice-versa. User-centred design approaches encourage an early focus on users and their contexts of use, but these need to be... Read More about Barry is not the weakest link: eliciting secure system requirements with personas..

Meaningful engagement: computer-based interactive media art in public space. (2010)
Conference Proceeding
HER, J.-J. and HAMLYN, J., 2010. Meaningful engagement: computer-based interactive media art in public space. In Huang, F. and Wang, R.-C. (eds.) Arts and Technology: revised selected papers from the proceedings of the 1st International conference on arts and technology (ArtsIT 2009), 24-25 September 2009, Yi-Lan, Taiwan. Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 30. Berlin: Springer [online], pages 17-24. Available from: https://doi.org/10.1007/978-3-642-11577-6_3

Interactive technologies, including electronic devices are increasingly being utilized as a medium for artistic expression and have been placed in freely accessible public environments with mixed results. When audiences encounter computer-based inter... Read More about Meaningful engagement: computer-based interactive media art in public space..

Multi-HDCS: solving DisCSPs with complex local problems cooperatively. (2010)
Conference Proceeding
LEE, D., ARANA, I., AHRIZ, H. and HUI, K. 2009. Multi-HDCS: solving DisCSPs with complex local problems cooperatively. In Huang, X.J., Ghorbani, A.A., Hacid, M.-S. and Yamaguchi, T. (eds.) Proceedings of the 2010 IEEE/WIC/ACM international conference on intelligent agent technology (IAT 2010), co-located with the 2010 IEEE/WIC/ACM international conference on web intelligence (WI 2010), and the joint conference workshops (WI-IAT Workshops 2010), 31 August - 3 September 2010, Toronto, Canada. Los Alamitos: IEEE Computer Society [online], volume 2, article number 5614767, pages 295-302. Available from: https://doi.org/10.1109/WI-IAT.2010.141

We propose Multi-HDCS, a new hybrid approach for solving Distributed CSPs with complex local problems. In Multi-HDCS, each agent concurrently: (i) runs a centralised systematic search for its complex local problem; (ii) participates in a distributed... Read More about Multi-HDCS: solving DisCSPs with complex local problems cooperatively..

Automatic features characterization from 3d facial images. (2010)
Conference Proceeding
ELYAN, E. and UGAIL, H. 2010. Automatic features characterization from 3d facial images. In Arabnia, H.R., Deligiannidis, L. and Solo, A.M.G. (eds.) Proceedings of the 14th International computer graphics and virtual reality conference (CGVR 2010), 12-15 July 2010, Las Vegas, USA. Georgia, USA: CSREA Press, pages 67-73.

This paper presents a novel and computationally fast method for automatic identification of symmetry profile from 3D facial images. The algorithm is based on the concepts of computational geometry which yield fast and accurate results. In order to de... Read More about Automatic features characterization from 3d facial images..

Developing tools to encourage reflection in first year students blogs. (2010)
Conference Proceeding
MCDERMOTT, R., BRINDLEY, G. and ECCLESTON, G. 2010. Developing tools to encourage reflection in first year students blogs. In Proceedings of the 15th Innovation and technology in computer science education annual conference (ITiCSE '10), 26-30 June 2010, Ankara, Turkey. New York: ACM [online], pages 147-151. Available from: https://doi.org/10.1145/1822090.1822132

The pedagogical basis of a project aimed at encouraging students to engage in reflective activities using blogs to document their learning experiences is described. It also gives some details of the practical implementation of this work. Activities w... Read More about Developing tools to encourage reflection in first year students blogs..

A meta-model for usable secure requirements engineering. (2010)
Conference Proceeding
FAILY, S. and FLÉCHAIS, I. 2010. A meta-model for usable secure requirements engineering. In Proceedings of the 2010 ICSE workshop on software engineering for secure systems (SESS '10): co-located with the 32nd ACM/IEEE international conference on software engineering (ICSE 2010), 2-8 May 2010, Cape Town, South Africa. New York: ACM [online], pages 29-35. Available from: https://doi.org/10.1145/1809100.1809105

There is a growing recognition of the need for secure software engineering approaches addressing both technical and human factors. Existing approaches to secure software engineering focus on the need for technical security to the detriment of usabili... Read More about A meta-model for usable secure requirements engineering..

Analysing and visualising security and usability in IRIS. (2010)
Conference Proceeding
FAILY, S. and FLÉCHAIS, I. 2010. Analysing and visualising security and usability in IRIS. In Proceedings of the 5th International conference on availability, reliability and security (ARES 2010), 15-18 February 2010, Krakow, Poland. Los Alamitos: IEEE Computer Society [online], pages 543-548. Available from: https://doi.org/10.1109/ares.2010.28

Despite a long-standing need to incorporate human factors into security risk analysis, taking a balanced approach to analysing security and usability concerns remains a challenge. Balancing security and usability is difficult due to human biases in s... Read More about Analysing and visualising security and usability in IRIS..