default search action
Shamal Faily
Person information
- affiliation: Bournemouth University, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Eylem Thron, Shamal Faily, Huseyin Dogan, Martin Freer:
Human factors and cyber-security risks on the railway - the critical role played by signalling operations. Inf. Comput. Secur. 32(2): 236-263 (2024) - 2022
- [j15]Duncan Ki-Aries, Shamal Faily, Huseyin Dogan, Christopher Williams:
Assessing system of systems information security risk with OASoSIS. Comput. Secur. 117: 102690 (2022) - [j14]Jane Henriksen-Bulmer, Cagatay Yucel, Shamal Faily, Ioannis Chalkias:
Privacy Goals for the Data Lifecycle. Future Internet 14(11): 315 (2022) - [c61]Rob Ashmore, Andrew Howe, Rhiannon Chilton, Shamal Faily:
Programming Language Evaluation Criteria for Safety-Critical Software in the Air Domain. ISSRE Workshops 2022: 230-237 - 2021
- [j13]Callum Pilton, Shamal Faily, Jane Henriksen-Bulmer:
Evaluating privacy - determining user privacy expectations on the web. Comput. Secur. 105: 102241 (2021) - [j12]Shamal Faily, Claudia Iacob, Raian Ali, Duncan Ki-Aries:
Visualising personas as goal models to find security tensions. Inf. Comput. Secur. 29(5): 787-815 (2021) - [c60]Amna Altaf, Shamal Faily, Huseyin Dogan, Alexios Mylonas, Eylem Thron:
Use-Case Informed Task Analysis for Secure and Usable Design Solutions in Rail. CRITIS 2021: 168-185 - [c59]Amna Altaf, Shamal Faily, Huseyin Dogan, Eylem Thron, Alexios Mylonas:
Integrated Design Framework for Facilitating Systems-Theoretic Process Analysis. CyberICPS/SECPRE/ADIoT/SPOSE/CPS4CIP/CDT&SECOMANE@ESORICS 2021: 58-73 - 2020
- [j11]Jane Henriksen-Bulmer, Shamal Faily, Sheridan Jeary:
DPIA in Context: Applying DPIA to Assess Privacy Risks of Cyber Physical Systems. Future Internet 12(5): 93 (2020) - [c58]Shamal Faily, Claudia Iacob, Raian Ali, Duncan Ki-Aries:
Identifying Implicit Vulnerabilities Through Personas as Goal Models. CyberICPS/SECPRE/ADIoT@ESORICS 2020: 185-202 - [c57]Shamal Faily, Riccardo Scandariato, Adam Shostack, Laurens Sion, Duncan Ki-Aries:
Contextualisation of Data Flow Diagrams for Security Analysis. GraMSec@CSF 2020: 186-197 - [c56]Claudia Iacob, Shamal Faily:
The Impact of Undergraduate Mentorship on Student Satisfaction and Engagement, Teamwork Performance, and Team Dysfunction in a Software Engineering Group Project. SIGCSE 2020: 128-134 - [i2]Shamal Faily, Riccardo Scandariato, Adam Shostack, Laurens Sion, Duncan Ki-Aries:
Contextualisation of Data Flow Diagrams for security analysis. CoRR abs/2006.04098 (2020) - [i1]Shamal Faily, Claudia Iacob, Raian Ali, Duncan Ki-Aries:
Identifying Implicit Vulnerabilities through Personas as Goal Models. CoRR abs/2008.04773 (2020)
2010 – 2019
- 2019
- [j10]Jane Henriksen-Bulmer, Shamal Faily, Sheridan Jeary:
Privacy risk assessment in context: A meta-model based on contextual integrity. Comput. Secur. 82: 270-283 (2019) - [j9]Andrew M'manga, Shamal Faily, John McAlaney, Chris Williams, Youki Kadobayashi, Daisuke Miyamoto:
A normative decision-making model for cyber security. Inf. Comput. Secur. 27(5) (2019) - [j8]Claudia Iacob, Shamal Faily:
Exploring the gap between the student expectations and the reality of teamwork in undergraduate software engineering group projects. J. Syst. Softw. 157 (2019) - [c55]Amna Altaf, Shamal Faily, Huseyin Dogan, Alexios Mylonas, Eylem Thron:
Identifying Safety and Human Factors Issues in Rail Using IRIS and CAIRIS. CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS 2019: 98-107 - [c54]Shamal Faily, Duncan Ki-Aries:
Usable and Secure Requirements Engineering with CAIRIS. RE 2019: 502-503 - 2018
- [b2]Shamal Faily:
Designing Usable and Secure Software with IRIS and CAIRIS. Springer 2018, ISBN 978-3-319-75492-5, pp. 3-254 - [c53]Andrew M'manga, Shamal Faily, Chris Williams, John McAlaney:
Rationalising Decision Making about Risk: A Normative Approach. HAISA 2018: 263-271 - [c52]Claudia Iacob, Shamal Faily:
Redesigning an undergraduate software engineering course for a large cohort. ICSE (SEET) 2018: 163-171 - [c51]Jane Henriksen-Bulmer, Shamal Faily, Sheridan Jeary:
Implementing GDPR in the Charity Sector: A Case Study. Privacy and Identity Management 2018: 173-188 - [c50]Duncan Ki-Aries, Shamal Faily, Huseyin Dogan, Christopher Williams:
Assessing System of Systems Security Risk and Requirements with OASoSIS. ESPRE@RE 2018: 14-20 - [c49]Joshua Coles, Shamal Faily, Duncan Ki-Aries:
Tool-Supporting Data Protection Impact Assessments with CAIRIS. ESPRE@RE 2018: 21-27 - [c48]Duncan Ki-Aries, Shamal Faily, Huseyin Dogan, Christopher Williams:
System of Systems Characterisation assisting Security Risk Assessment. SoSE 2018: 485-492 - [e4]Kristian Beckers, Shamal Faily, Seok-Won Lee, Nancy R. Mead:
5th IEEE International Workshop on Evolving Security & Privacy Requirements Engineering, ESPRE@RE 2018, Banff, AB, Canada, August 20, 2018. IEEE 2018, ISBN 978-1-5386-8420-7 [contents] - 2017
- [j7]Duncan Ki-Aries, Shamal Faily:
Persona-centred information security awareness. Comput. Secur. 70: 663-674 (2017) - [c47]Jane Henriksen-Bulmer, Shamal Faily:
Applying Contextual Integrity to Open Data Publishing. BCS HCI 2017 - [c46]Claudia Iacob, Shamal Faily:
Using Extreme Characters to Teach Requirements Engineering. CSEE&T 2017: 107-111 - [c45]Duncan Ki-Aries, Shamal Faily, Huseyin Dogan, Christopher Williams:
Re-framing "the AMN": A case study eliciting and modelling a System of Systems using the Afghan Mission Network. RCIS 2017: 103-108 - [c44]Andrew M'manga, Shamal Faily, John McAlaney, Christopher Williams:
System design considerations for risk perception. RCIS 2017: 322-327 - [c43]Shamal Faily, Claudia Iacob:
Design as Code: Facilitating Collaboration Between Usability and Security Engineers Using CAIRIS. RE Workshops 2017: 76-82 - [c42]Duncan Ki-Aries, Huseyin Dogan, Shamal Faily, Paul Whittington, Christopher Williams:
From Requirements to Operation: Components for Risk Assessment in a Pervasive System of Systems. RE Workshops 2017: 83-89 - [c41]Andrew M'manga, Shamal Faily, John McAlaney, Christopher Williams:
Folk Risk Analysis: Factors Influencing Security Analysts' Interpretation of Risk. SOUPS 2017 - 2016
- [j6]Shamal Faily, Ivan Flechais:
Finding and resolving security misusability with misusability cases. Requir. Eng. 21(2): 209-223 (2016) - [c40]Shamal Faily, Claudia Iacob, Sarah Field:
Ethical Hazards and Safeguards in Penetration Testing. BCS HCI 2016 - [c39]Shamal Faily, Georgia Lykou, Anton Partridge, Dimitris Gritzalis, Alexios Mylonas, Vasilios Katos:
Human-Centered Specification Exemplars for Critical Infrastructure Environments. BCS HCI 2016 - [c38]Claudia Iacob, Shamal Faily:
Improving Human-Reviews Interaction: A Study of the Role, Use, and Place of Online Reviews. BCS HCI 2016 - [c37]Duncan Ki-Aries, Shamal Faily, Kristian Beckers:
Persona-Driven Information Security Awareness. BCS HCI 2016 - [c36]Anton Partridge, Shamal Faily:
The Application of useless Japanese Inventions for Requirements Elicitation in Information Security. BCS HCI 2016 - [c35]Claudia Iacob, Shamal Faily, Rachel Harrison:
MARAM: Tool Support for Mobile App Review Management. MobiCASE 2016: 42-50 - [c34]Kristian Beckers, Shamal Faily, Seok-Won Lee, Nancy R. Mead:
Welcome to the Third Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE). RE Workshops 2016: 53 - [e3]Shamal Faily, Nan Jiang, Huseyin Dogan, Jacqui Taylor:
HCI 2016 - Fusion! Proceedings of the 30th International BCS Human Computer Interaction Conference, BCS HCI 2016, Bournemouth University, Poole, UK, 11-15 July 2016. Workshops in Computing, BCS 2016 [contents] - 2015
- [j5]Shamal Faily:
Engaging stakeholders during late stage security design with assumption personas. Inf. Comput. Secur. 23(4): 435-446 (2015) - [j4]Claudia Iacob, Shamal Faily, David Bell:
Special section: software quality for mobile apps. Softw. Qual. J. 23(3): 483-484 (2015) - [c33]Raian Ali, John McAlaney, Shamal Faily, Keith Phalp, Vasilios Katos:
Mitigating Circumstances in Cybercrime: A Position Paper. CIT/IUCC/DASC/PICom 2015: 1972-1976 - [c32]Antonios Vallindras, Shamal Faily:
The mystery of security design. BCS HCI 2015: 316-317 - [c31]Shamal Faily, George Stergiopoulos, Vasilios Katos, Dimitris Gritzalis:
"Water, Water, Every Where": Nuances for a Water Industry Critical Infrastructure Specification Exemplar. CRITIS 2015: 243-246 - [c30]Shamal Faily, John McAlaney, Claudia Iacob:
Ethical Dilemmas and Dimensions in Penetration Testing. HAISA 2015: 233-242 - [c29]Neil McDonald, Shamal Faily, Marcella Favale, Christos Gatzidis:
Digital Rights Management: The Four Perspectives of Developers, Distributors, Users, and Lawyers. HAISA 2015: 276-285 - 2014
- [c28]Shamal Faily, John Lyle, Ivan Flechais, Andrea S. Atzeni, Cesare Cameroni, Hans I. Myrhaug, Ayse Göker, Robert Kleinfeld:
Authorisation in Context: Incorporating Context-Sensitivity into an Access Control Framework. BCS HCI 2014 - [c27]Shamal Faily:
Engaging Stakeholders in Security Design: An Assumption-Driven Approach. HAISA 2014: 21-29 - [c26]Shamal Faily, Ivan Flechais:
Eliciting and visualising trust expectations using persona trust characteristics and goal models. SSE@SIGSOFT FSE 2014: 17-24 - [p1]Shamal Faily, Simon Parkin, John Lyle:
Evaluating the Implications of Attack and Security Patterns with Premortems. Cyberpatterns 2014: 199-209 - [e2]Kristian Beckers, Shamal Faily, Seok-Won Lee, Nancy R. Mead:
IEEE 1st Workshop on Evolving Security and Privacy Requirements Engineering, ESPRE 2014, 25 August, 2014, Karlskrona, Sweden. IEEE Computer Society 2014, ISBN 978-1-4799-6340-9 [contents] - 2013
- [c25]Shamal Faily, Lizzie Coles-Kemp, Paul Dunphy, Mike Just, Yoko Akama, Alexander De Luca:
Designing interactive secure system: chi 2013 special interest group. CHI Extended Abstracts 2013: 2469-2472 - [c24]Shamal Faily, John Lyle:
Guidelines for integrating personas into software engineering tools. EICS 2013: 69-74 - [c23]Tao Su, John Lyle, Andrea S. Atzeni, Shamal Faily, Habib Virji, Christos Ntanos, Christos Botsikas:
Continuous Integration for Web-Based Software Infrastructures: Lessons Learned on the webinos Project. Haifa Verification Conference 2013: 145-150 - [c22]Claudia Iacob, Rachel Harrison, Shamal Faily:
Online Reviews as First Class Artifacts in Mobile App Development. MobiCASE 2013: 47-53 - [c21]John Lyle, Claes Nilsson, Anders Isberg, Shamal Faily:
Extending the web to support personal network services. SAC 2013: 711-716 - [c20]Shamal Faily, David Power, Philip Armstrong, Ivan Flechais:
Formal Evaluation of Persona Trustworthiness with EUSTACE - (Extended Abstract). TRUST 2013: 267-268 - [e1]John Lyle, Shamal Faily, Marcel Winandy:
Proceedings of the Workshop on Web Applications and Secure Hardware (WASH'13), Co-located with the 6th International Conference on Trust and Trustworthy Computing (TRUST 2013), London, United Kingdom, June 20, 2013. CEUR Workshop Proceedings 1011, CEUR-WS.org 2013 [contents] - 2012
- [c19]John Lyle, Shamal Faily, Ivan Flechais, André Paul, Ayse Göker, Hans I. Myrhaug, Heiko Desruelle, Andrew P. Martin:
On the Design and Development of webinos: A Distributed Mobile Application Middleware. DAIS 2012: 140-147 - [c18]John Lyle, Andrew J. Paverd, Justin King-Lacroix, Andrea S. Atzeni, Habib Virji, Ivan Flechais, Shamal Faily:
Personal PKI for the Smart Device Era. EuroPKI 2012: 69-84 - [c17]Shamal Faily, John Lyle, André Paul, Andrea S. Atzeni, Dieter Blomme, Heiko Desruelle, Krishna Bangalore:
Requirements Sensemaking Using Concept Maps. HCSE 2012: 217-232 - [c16]Shamal Faily, John Lyle, Cornelius Namiluko, Andrea S. Atzeni, Cesare Cameroni:
Model-driven architectural risk analysis using architectural and contextualised attack patterns. MDsec@MoDELS 2012: 3 - [c15]John Lyle, Salvatore Monteleone, Shamal Faily, Davide Patti, Fabio Ricciato:
Cross-Platform Access Control for Mobile Web Applications. POLICY 2012: 37-44 - [c14]Christian Fuhrhop, John Lyle, Shamal Faily:
The webinos project. WWW (Companion Volume) 2012: 259-262 - 2011
- [b1]Shamal Faily:
A framework for usable and secure system design. University of Oxford, UK, 2011 - [j3]Shamal Faily, Ivan Flechais:
Eliciting Policy Requirements for Critical National Infrastructure Using the IRIS Framework. Int. J. Secur. Softw. Eng. 2(4): 1-18 (2011) - [c13]Shamal Faily, Ivan Flechais:
User-Centered Information Security Policy Development in a Post-Stuxnet World. ARES 2011: 716-721 - [c12]Andrea S. Atzeni, Cesare Cameroni, Shamal Faily, John Lyle, Ivan Flechais:
Here's Johnny: A Methodology for Developing Attacker Personas. ARES 2011: 722-727 - [c11]Shamal Faily, Ivan Flechais:
Persona cases: a technique for grounding personas. CHI 2011: 2267-2270 - [c10]Shamal Faily:
Bridging User-Centered Design and Requirements Engineering with GRL and Persona Cases. iStar 2011: 114-119 - [c9]Shamal Faily, Ivan Flechais:
Eliciting usable security requirements with misusability cases. RE 2011: 339-340 - 2010
- [j2]Shamal Faily, Ivan Flechais:
Towards Tool-Support for Usable Secure Requirements Engineering with CAIRIS. Int. J. Secur. Softw. Eng. 1(3): 56-70 (2010) - [j1]Shamal Faily, Ivan Flechais:
Designing and Aligning e-Science Security Culture with Design. Inf. Manag. Comput. Secur. 18(5): 339-349 (2010) - [c8]Shamal Faily, Ivan Flechais:
Analysing and Visualising Security and Usability in IRIS. ARES 2010: 543-548 - [c7]Shamal Faily, Ivan Flechais:
Barry is not the weakest link: eliciting secure system requirements with personas. BCS HCI 2010: 124-132 - [c6]Shamal Faily, Ivan Flechais:
A Model of Security Culture for e-Science. SAISMC 2010: 154-164 - [c5]Shamal Faily, Ivan Flechais:
The Secret Lives of Assumptions: Developing and Refining Assumption Personas for Secure System Design. HCSE 2010: 111-118 - [c4]Shamal Faily, Ivan Flechais:
A meta-model for usable secure requirements engineering. SESS@ICSE 2010: 29-35 - [c3]Shamal Faily, Ivan Flechais:
To boldly go where invention isn't secure: applying security entrepreneurship to secure systems design. NSPW 2010: 73-84
2000 – 2009
- 2009
- [c2]Shamal Faily, Ivan Flechais:
Context-Sensitive Requirements and Risk Management with IRIS. RE 2009: 379-380 - 2008
- [c1]Shamal Faily:
Towards Requirements Engineering Practice for Professional End User Developers: A Case Study. REET 2008: 38-44
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-07 02:00 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint