Shamal Faily
Shamal Faily
Defence Science and Technology Laboratory
Verified email at - Homepage
Cited by
Cited by
Persona cases: a technique for grounding personas
S Faily, I Flechais
Proceedings of the 2011 annual conference on Human factors in computing …, 2011
Persona-centred information security awareness
D Ki-Aries, S Faily
computers & security 70, 663-674, 2017
Barry is not the weakest link: Eliciting Secure System Requirements with Personas
S Faily, I Fléchais
Proceedings of the 24th BCS Interaction Specialist Group Conference, 124-132, 2010
A meta-model for usable secure requirements engineering
S Faily, I Fléchais
Proceedings of the 2010 ICSE Workshop on Software Engineering for Secure …, 2010
Here's Johnny: A Methodology for Developing Attacker Personas
A Atzeni, C Cameroni, S Faily, J Lyle, I Flechais
Availability, Reliability and Security (ARES), 2011 Sixth International …, 2011
Online reviews as first class artifacts in mobile app development
C Iacob, R Harrison, S Faily
International Conference on Mobile Computing, Applications, and Services, 47-53, 2013
The secret lives of assumptions: Developing and refining assumption personas for secure system design
S Faily, I Fléchais
Human-Centred Software Engineering, 111-118, 2010
The webinos Project
C Fuhrhop, J Lyle, S Faily
Towards tool-support for usable secure requirements engineering with CAIRIS
S Faily, I Flechais
International Journal of Secure Software Engineering (IJSSE) 1 (3), 56-70, 2010
Cross-platform access control for mobile web applications
J Lyle, S Monteleone, S Faily, D Patti, F Ricciato
2012 IEEE International Symposium on Policies for Distributed Systems and …, 2012
A framework of usable and secure system design
S Faily
Oxford University, UK, 2011
Guidelines for integrating personas into software engineering tools
S Faily, J Lyle
Proceedings of the 5th ACM SIGCHI symposium on Engineering interactive …, 2013
Designing Usable and Secure Software with IRIS and CAIRIS
S Faily
Springer International Publishing, 2018
User&# x2212; Centered Information Security Policy Development in a Post&# x2212; Stuxnet World
S Faily, I Flechais
Fifth International Workshop on Secure Software Engineering, 2011
Requirements sensemaking using concept maps
S Faily, J Lyle, A Paul, A Atzeni, D Blomme, H Desruelle, K Bangalore
International conference on human-centred software engineering, 217-232, 2012
Designing and aligning e-Science security culture with design
S Faily, I Fléchais
Information Management & Computer Security 18 (5), 339-349, 2010
Exploring the gap between the student expectations and the reality of teamwork in undergraduate software engineering group projects
C Iacob, S Faily
Journal of systems and software 157, 110393, 2019
Eliciting and visualising trust expectations using persona trust characteristics and goal models
S Faily, I Fléchais
Proceedings of the 6th International Workshop on Social Software Engineering …, 2014
Bridging User-Centered Design and Requirements Engineering with GRL and Persona Cases
S Faily
The social psychology of cybersecurity
J McAlaney, J Taylor, S Faily
Psychologist 29 (9), 686-689, 2016
The system can't perform the operation now. Try again later.
Articles 1–20