LOGIN TO YOUR ACCOUNT

Username
Password
Remember Me
Or use your Academic/Social account:

CREATE AN ACCOUNT

Or use your Academic/Social account:

Congratulations!

You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.

Important!

Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message

CREATE AN ACCOUNT

Name:
Username:
Password:
Verify Password:
E-mail:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Vallindras, A.; Faily, Shamal (2015)
Publisher: ACM
Languages: English
Types: Unknown
Subjects:
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • [1] S. Faily and I. Flechais. Barry is not the weakest link: eliciting secure system requirements with personas. In Proceedings of the 24th BCS Interaction Specialist Group Conference, pages 124{132. British Computer Society, 2010.
    • [2] S. Faily and I. Flechais. To boldly go where invention isn't secure: applying Security Entrepreneurship to secure systems design. In Proceedings of the 2010 New Security Paradigms Workshop, pages 73{84. ACM, 2010.
    • [3] S. Faily and I. Flechais. Persona cases: a technique for grounding personas. In Proceedings of the 29th international conference on Human factors in computing systems, CHI '11, pages 2267{2270. ACM, 2011.
    • [4] S. Faily and I. Flechais. User-centered information security policy development in a post-stuxnet world. In Proceedings of the 6th International Conference on Availability, Reliability and Security, pages 716{721, 2011.
    • [5] S. Faily, J. McAlaney, and C. Iacob. Ethical Dilemmas and Dimensions in Penetration Testing. In Proceedings of the 9th International Symposium on Human Aspects of Information Security & Assurance. University of Plymouth, 2015. To Appear.
    • [6] D. Flor^encio, C. Herley, and A. Shostack. FUD: A Plea for Intolerance. Communications of the ACM, 57(6):31{33, June 2014.
    • [7] A. Vallindras and S. Faily. Designing Security through Personas. https://vimeo.com/128293398, May 2015.
  • No related research data.
  • No similar publications.

Share - Bookmark

Cite this article