Joseph Hallett
Joseph Hallett
Verified email at
Cited by
Cited by
Usability Smells: An Analysis of {Developers’} Struggle With Crypto Libraries
N Patnaik, J Hallett, A Rashid
Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019), 245-257, 2019
Bringing cyber to school: Integrating cybersecurity into secondary school education
D Pencheva, J Hallett, A Rashid
IEEE Security & Privacy 18 (2), 68-74, 2020
Mirror, mirror, on the wall: What are we teaching them all? Characterising the focus of cybersecurity curricular frameworks
J Hallett, R Larson, A Rashid
2018 USENIX Workshop on Advances in Security Education (ASE 18), 2018
The impact of surface features on choice of (in) secure answers by Stackoverflow readers
D Van Der Linden, E Williams, J Hallett, A Rashid
IEEE Transactions on Software Engineering 48 (2), 364-376, 2020
“Do this! Do that!, And nothing will happen” Do specifications lead to securely stored passwords?
J Hallett, N Patnaik, B Shreeve, A Rashid
2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE …, 2021
The best laid plans or lack thereof: Security decision-making of different stakeholder groups
B Shreeve, J Hallett, M Edwards, KM Ramokapane, R Atkins, A Rashid
IEEE Transactions on Software Engineering, 2020
“So If Mr Blue Head Here Clicks the Link...” risk thinking in cyber security decision making
B Shreeve, J Hallett, M Edwards, P Anthonysamy, S Frey, A Rashid
ACM Transactions on Privacy and Security (TOPS) 24 (1), 1-29, 2020
Developers are neither enemies nor users: they are collaborators
PD Chowdhury, J Hallett, N Patnaik, M Tahaei, A Rashid
2021 IEEE Secure Development Conference (SecDev), 47-55, 2021
The United Kingdom’s cyber security degree certification program: a cyber security body of knowledge case study
L Nautiyal, A Rashid, J Hallett, B Shreeve, K Michael, E Chris, ...
IEEE Security & Privacy 20 (1), 87-95, 2022
Towards an authorization framework for app security checking
J Hallett, D Aspinall
Proceedings of the 2014 ESSoS Doctoral Symposium co-located with the …, 2014
AppPAL for Android: Capturing and Checking Mobile App Policies
J Hallett, D Aspinall
Engineering Secure Software and Systems: 8th International Symposium, ESSoS …, 2016
SLR: from saltzer and schroeder to 2021… 47 years of research on the development and validation of security API recommendations
N Patnaik, A Dwyer, J Hallett, A Rashid
ACM Transactions on Software Engineering and Methodology 32 (3), 1-31, 2023
Capturing Policies for BYOD
J Hallett, D Aspinall
ICT Systems Security and Privacy Protection: 32nd IFIP TC 11 International …, 2017
If you build it, will they come? Developer recruitment for security studies
N Patnaik, J Hallett, M Tahaei, A Rashid
Recruitment of Participants for Empirical SE Studies (RoPES), 2022
Don't forget your classics: Systematizing 45 years of Ancestry for Security API Usability Recommendations
N Patnaik, AC Dwyer, J Hallett, A Rashid
arXiv preprint arXiv:2105.02031, 2021
The UK’s Cyber Security Degree Certification Programme: A CyBOK Case Study
L Nautiyal, A Rashid, J Hallett, B Shreeve
Technical Report, 2020
How darknet market users learned to worry more and love PGP: Analysis of security advice on darknet marketplaces
AC Dwyer, J Hallett, C Peersman, M Edwards, BI Davidson, A Rashid
arXiv preprint arXiv:2203.08557, 2022
Common Concerns in BYOD Policies
J Hallett, D Aspinall
Workshop on Innovations in Mobile Privacy and Security, 2017
Sandboxing Adoption in Open Source Ecosystems
M Alhindi, J Hallett
arXiv preprint arXiv:2405.06447, 2024
Super Mario in the Pernicious Kingdoms: Classifying glitches in old games
L Forward, I Limmer, J Hallett, D Page
arXiv preprint arXiv:2404.14870, 2024
The system can't perform the operation now. Try again later.
Articles 1–20