Ivan Flechais : Publications
-
[1]
"It Becomes More of an Abstract Idea‚ this Privacy" − Informing the Design for Communal Privacy Experiences in Smart Homes.
Martin Kraemer‚ Helena Webb‚ George Chalhoub and Ivan Flechais.
In International Journal of Human−Computer Studies (IJHCS 2023). December, 2023.
Details about "It Becomes More of an Abstract Idea‚ this Privacy" − Informing the Design for Communal Privacy Experiences in Smart Homes. | BibTeX data for "It Becomes More of an Abstract Idea‚ this Privacy" − Informing the Design for Communal Privacy Experiences in Smart Homes. | Download (pdf) of "It Becomes More of an Abstract Idea‚ this Privacy" − Informing the Design for Communal Privacy Experiences in Smart Homes. | DOI (10.1016/j.ijhcs.2023.103138) | Link to "It Becomes More of an Abstract Idea‚ this Privacy" − Informing the Design for Communal Privacy Experiences in Smart Homes.
-
[2]
Data Protection at a Discount: Investigating the UX of Data Protection from User‚ Designer‚ and Business Leader Perspectives
George Chalhoub and Ivan Flechais
In The 25th ACM Conference On Computer−Supported Cooperative Work And Social Computing (CSCW 2022). ACM. November, 2022.
Details about Data Protection at a Discount: Investigating the UX of Data Protection from User‚ Designer‚ and Business Leader Perspectives | BibTeX data for Data Protection at a Discount: Investigating the UX of Data Protection from User‚ Designer‚ and Business Leader Perspectives | Download (pdf) of Data Protection at a Discount: Investigating the UX of Data Protection from User‚ Designer‚ and Business Leader Perspectives | DOI (10.1145/3555537)
-
[3]
Exploring Bystanders’ Privacy Concerns with Smart Homes in Jordan
Wael Albayaydh and Ivan Flechais
In CHI Conference on Human Factors in Computing Systems (CHI '22)‚ April 29−May 5‚ 2022‚ New Orleans‚ LA‚ USA. 2022.
Details about Exploring Bystanders’ Privacy Concerns with Smart Homes in Jordan | BibTeX data for Exploring Bystanders’ Privacy Concerns with Smart Homes in Jordan | Download (pdf) of Exploring Bystanders’ Privacy Concerns with Smart Homes in Jordan | DOI (10.1145/3491102.3502097)
-
[4]
"It did not give me an option to decline": A Longitudinal Analysis of the User Experience of Security and Privacy in Smart Home Products
George Chalhoub‚ Martin J. Kraemer‚ Norbert Nthala and Ivan Flechais
In 2021 CHI Conference on Human Factors in Computing Systems (CHI 2021). ACM. May, 2021.
Details about "It did not give me an option to decline": A Longitudinal Analysis of the User Experience of Security and Privacy in Smart Home Products | BibTeX data for "It did not give me an option to decline": A Longitudinal Analysis of the User Experience of Security and Privacy in Smart Home Products | Download (pdf) of "It did not give me an option to decline": A Longitudinal Analysis of the User Experience of Security and Privacy in Smart Home Products | DOI (10.1145/3411764.3445691)
-
[5]
Innovation Inaction or In Action? The Role of User Experience in the Security and Privacy Design of Smart Home Cameras
George Chalhoub‚ Ivan Flechais‚ Norbert Nthala and Ruba Abu−Salma
In Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020). USENIX Association. August, 2020.
Details about Innovation Inaction or In Action? The Role of User Experience in the Security and Privacy Design of Smart Home Cameras | BibTeX data for Innovation Inaction or In Action? The Role of User Experience in the Security and Privacy Design of Smart Home Cameras | Download (pdf) of Innovation Inaction or In Action? The Role of User Experience in the Security and Privacy Design of Smart Home Cameras | Link to Innovation Inaction or In Action? The Role of User Experience in the Security and Privacy Design of Smart Home Cameras
-
[6]
"Alexa‚ are you spying on me?": Exploring the Effect of User Experience on the Security and Privacy of Smart Speaker Users
George Chalhoub and Ivan Flechais
In 22nd International Conference on Human−Computer Interaction (HCII 2020). Springer. July, 2020.
Details about "Alexa‚ are you spying on me?": Exploring the Effect of User Experience on the Security and Privacy of Smart Speaker Users | BibTeX data for "Alexa‚ are you spying on me?": Exploring the Effect of User Experience on the Security and Privacy of Smart Speaker Users | Download (pdf) of "Alexa‚ are you spying on me?": Exploring the Effect of User Experience on the Security and Privacy of Smart Speaker Users | DOI (10.1007/978-3-030-50309-3_21)
-
[7]
Factoring User Experience into the Security and Privacy Design of Smart Home Devices: A Case Study
George Chalhoub‚ Ivan Flechais‚ Norbert Nthala‚ Ruba Abu−Salma and Elie Tom
In Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems (CHI EA 2020). ACM. April, 2020.
Details about Factoring User Experience into the Security and Privacy Design of Smart Home Devices: A Case Study | BibTeX data for Factoring User Experience into the Security and Privacy Design of Smart Home Devices: A Case Study | Download (pdf) of Factoring User Experience into the Security and Privacy Design of Smart Home Devices: A Case Study | DOI (10.1145/3334480.3382850)
-
[8]
Policies in Context: Factors Influencing the Elicitation and Categorisation of Context−Sensitive Security Policies
Shamal Faily‚ John Lyle‚ Ivan Flechais‚ Andrea Atzeni‚ Cesare Cameroni‚ Hans Myrhaug‚ Ayse Goker and Robert Kleinfeld
In Proceedings of the Workshop on Home Usable Privacy and Security. 2013.
Details about Policies in Context: Factors Influencing the Elicitation and Categorisation of Context−Sensitive Security Policies | BibTeX data for Policies in Context: Factors Influencing the Elicitation and Categorisation of Context−Sensitive Security Policies
-
[9]
Formal Evaluation of Persona Trustworthiness with EUSTACE (Extended Abstract)
Shamal Faily‚ David Power‚ Philip Armstrong and Ivan Flechais
In Trust and Trustworthy Computing‚ 6th International Conference‚ TRUST 2013. 2013.
To Appear
Details about Formal Evaluation of Persona Trustworthiness with EUSTACE (Extended Abstract) | BibTeX data for Formal Evaluation of Persona Trustworthiness with EUSTACE (Extended Abstract)
-
[10]
Software for Interactive Secure Systems Design: Lessons Learned Developing and Applying CAIRIS
Shamal Faily and Ivan Flechais
In Proceedings of BCS HCI 2012 Workshops: Designing Interactive Secure Systems. Pages 3:1–3:4. 2012.
Details about Software for Interactive Secure Systems Design: Lessons Learned Developing and Applying CAIRIS | BibTeX data for Software for Interactive Secure Systems Design: Lessons Learned Developing and Applying CAIRIS | Download (pdf) of Software for Interactive Secure Systems Design: Lessons Learned Developing and Applying CAIRIS
-
[11]
Personal PKI for the smart device era
John Lyle‚ Andrew Paverd‚ Justin King−Lacroix‚ Andrea Atzeni‚ Habib Virji‚ Ivan Flechais and Shamal Faily
In 9th European PKI Workshop: Research and Applications. 2012.
Details about Personal PKI for the smart device era | BibTeX data for Personal PKI for the smart device era | Download (pdf) of Personal PKI for the smart device era
-
[12]
On the design and development of webinos: a distributed mobile application middleware
John Lyle‚ Shamal Faily‚ Ivan Flechais‚ Andre Paul‚ Ayse Goker‚ Hans Myrhaug‚ Heiko Desruelle and Andrew Martin
In Proceedings of the 12th IFIP WG 6.1 international conference on Distributed applications and interoperable systems. Pages 140–147. 2012.
Details about On the design and development of webinos: a distributed mobile application middleware | BibTeX data for On the design and development of webinos: a distributed mobile application middleware | Download (pdf) of On the design and development of webinos: a distributed mobile application middleware
-
[13]
Eliciting Policy Requirements for Critical National Infrastructure using the IRIS Framework
Shamal Faily and Ivan Flechais
In International Journal of Secure Software Engineering. Vol. 2. No. 4. Pages 1–18. 2011.
Details about Eliciting Policy Requirements for Critical National Infrastructure using the IRIS Framework | BibTeX data for Eliciting Policy Requirements for Critical National Infrastructure using the IRIS Framework
-
[14]
Eliciting Usable Security Requirements with Misusability Cases
Shamal Faily and Ivan Flechais
In Proceedings of the 19th IEEE International Requirements Engineering Conference. Pages 339–340. IEEE Computer Society. 2011.
Pre−print available at http://www.cs.ox.ac.uk/files/4125/PID1921187.pdf
Details about Eliciting Usable Security Requirements with Misusability Cases | BibTeX data for Eliciting Usable Security Requirements with Misusability Cases | Download (pdf) of Eliciting Usable Security Requirements with Misusability Cases | DOI (10.1109/RE.2011.6051665)
-
[15]
Here's Johnny: a Methodology for Developing Attacker Personas
Andrea Atzeni‚ Shamal Faily‚ John Lyle‚ Cesare Cameroni and Ivan Flechais
In Proceedings of the 6th International Conference on Availability‚ Reliability and Security. Pages 722–727. 2011.
Details about Here's Johnny: a Methodology for Developing Attacker Personas | BibTeX data for Here's Johnny: a Methodology for Developing Attacker Personas | Download (pdf) of Here's Johnny: a Methodology for Developing Attacker Personas
-
[16]
User−Centered Information Security Policy Development in a Post−Stuxnet World
Shamal Faily and Ivan Flechais
In Proceedings of the 6th International Conference on Availability‚ Reliability and Security. Pages 716–721. 2011.
Details about User−Centered Information Security Policy Development in a Post−Stuxnet World | BibTeX data for User−Centered Information Security Policy Development in a Post−Stuxnet World | Download (pdf) of User−Centered Information Security Policy Development in a Post−Stuxnet World
-
[17]
Persona Cases: A Technique for grounding Personas
Shamal Faily and Ivan Flechais
In CHI '11: Proceedings of the 29th International conference on Human factors in computing systems. Pages 2267−2270. Vancouver‚ BC‚ Canada. 2011. ACM.
Details about Persona Cases: A Technique for grounding Personas | BibTeX data for Persona Cases: A Technique for grounding Personas
-
[18]
A Meta−Model for Usable Secure Requirements Engineering
Shamal Faily and Ivan Flechais
In Software Engineering for Secure Systems‚ 2010. SESS '10. ICSE Workshop on. Pages 29–35. May, 2010.
Details about A Meta−Model for Usable Secure Requirements Engineering | BibTeX data for A Meta−Model for Usable Secure Requirements Engineering | Download (pdf) of A Meta−Model for Usable Secure Requirements Engineering | DOI (10.1145/1809100.1809105)
-
[19]
Analysing and Visualising Security and Usability in IRIS
Shamal Faily and Ivan Flechais
In Availability‚ Reliability and Security‚ 2010. ARES 10. Fifth International Conference on. February, 2010.
Details about Analysing and Visualising Security and Usability in IRIS | BibTeX data for Analysing and Visualising Security and Usability in IRIS | Download (pdf) of Analysing and Visualising Security and Usability in IRIS | DOI (10.1109/ARES.2010.28)
-
[20]
Improving Secure Systems Design with Security Culture
Shamal Faily and Ivan Flechais
In Poster at: Human Factors in Information Security. February, 2010.
Details about Improving Secure Systems Design with Security Culture | BibTeX data for Improving Secure Systems Design with Security Culture | Download (pdf) of Improving Secure Systems Design with Security Culture
-
[21]
Towards tool−support for Usable Secure Requirements Engineering with CAIRIS
Shamal Faily and Ivan Flechais
In International Journal of Secure Software Engineering. Vol. 1. No. 3. Pages 56–70. 2010.
Details about Towards tool−support for Usable Secure Requirements Engineering with CAIRIS | BibTeX data for Towards tool−support for Usable Secure Requirements Engineering with CAIRIS | DOI (10.4018/ijsse.2010070104)
-
[22]
Designing and Aligning e−Science Security Culture with Design
Shamal Faily and Ivan Flechais
In Information Management & Computer Security. Vol. 18. No. 5. 2010.
Details about Designing and Aligning e−Science Security Culture with Design | BibTeX data for Designing and Aligning e−Science Security Culture with Design
-
[23]
Security through Usability: a user−centered approach for balanced security policy requirements
Shamal Faily and Ivan Flechais
In Poster at: Annual Computer Security Applications Conference. 2010.
Details about Security through Usability: a user−centered approach for balanced security policy requirements | BibTeX data for Security through Usability: a user−centered approach for balanced security policy requirements | Download (pdf) of Security through Usability: a user−centered approach for balanced security policy requirements
-
[24]
Security and Usability: Searching for the philosopher's stone
Ivan Flechais and Shamal Faily
In Workshop on the development of EuroSOUPS (European Symposium on Usable Privacy and Security). 2010.
Details about Security and Usability: Searching for the philosopher's stone | BibTeX data for Security and Usability: Searching for the philosopher's stone | Download (pdf) of Security and Usability: Searching for the philosopher's stone
-
[25]
Barry is not the weakest link: Eliciting Secure System Requirements with Personas
Shamal Faily and Ivan Flechais
In Proceedings of the 24th British HCI Group Annual Conference on People and Computers: Play is a Serious Business. Pages 113–120. British Computer Society. 2010.
Details about Barry is not the weakest link: Eliciting Secure System Requirements with Personas | BibTeX data for Barry is not the weakest link: Eliciting Secure System Requirements with Personas | Download (pdf) of Barry is not the weakest link: Eliciting Secure System Requirements with Personas
-
[26]
The Secret Lives of Assumptions: Developing and Refining Assumption Personas for Secure System Design
Shamal Faily and Ivan Flechais
In HCSE'2010: Proceedings of the 3rd Conference on Human−Centered Software Engineering. Pages 111–118. Springer. 2010.
Details about The Secret Lives of Assumptions: Developing and Refining Assumption Personas for Secure System Design | BibTeX data for The Secret Lives of Assumptions: Developing and Refining Assumption Personas for Secure System Design | Download (pdf) of The Secret Lives of Assumptions: Developing and Refining Assumption Personas for Secure System Design
-
[27]
To boldly go where invention isn't secure: applying Security Entrepreneurship to secure systems design
Shamal Faily and Ivan Flechais
In NSPW '10: Proceedings of the 2010 New Security Paradigms Workshop. Pages 73–84. New York‚ NY‚ USA. 2010. ACM.
Details about To boldly go where invention isn't secure: applying Security Entrepreneurship to secure systems design | BibTeX data for To boldly go where invention isn't secure: applying Security Entrepreneurship to secure systems design | Download (pdf) of To boldly go where invention isn't secure: applying Security Entrepreneurship to secure systems design
-
[28]
A Model of Security Culture for e−Science
Shamal Faily and Ivan Flechais
In Nathan Clarke‚ Steven Furnell and Rossouw von Solms, editors, Proceedings of the South African Information Security Multi−Conference (SAISMC 2010). Pages 154–164. University of Plymouth. 2010.
Details about A Model of Security Culture for e−Science | BibTeX data for A Model of Security Culture for e−Science | Download (pdf) of A Model of Security Culture for e−Science
-
[29]
Two Heads are Better Than One: Security and Usability of Device Associations in Group Scenarios
A. W. Roscoe Ronald Kainda Ivan Flechais
In Proceedings of the 2010 Symposium on Usable Privacy and Security (SOUPS 2010). 2010.
Details about Two Heads are Better Than One: Security and Usability of Device Associations in Group Scenarios | BibTeX data for Two Heads are Better Than One: Security and Usability of Device Associations in Group Scenarios
-
[30]
Secure and Usable Out−Of−Band Channels for Ad hoc Mobile Device Interactions
Ronald Kainda‚ Ivan Flechais and A.W Roscoe
2010.
Details about Secure and Usable Out−Of−Band Channels for Ad hoc Mobile Device Interactions | BibTeX data for Secure and Usable Out−Of−Band Channels for Ad hoc Mobile Device Interactions
-
[31]
Security and Usability: Analysis and Evaluation
A. W. Roscoe Ronald Kainda Ivan Flechais
2010.
Details about Security and Usability: Analysis and Evaluation | BibTeX data for Security and Usability: Analysis and Evaluation
-
[32]
Secure Mobile Ad−hoc Interactions: Reasoning About Out−Of−Band (OOB) Channels
A. W. Roscoe Ronald Kainda Ivan Flechais
In Proceedings of IWSSI 2010‚ Second International Workshop on Security for Spontaneous Interaction‚ The Eighth International Conference on Pervasive Computing (Pervasive 2010). 2010.
Details about Secure Mobile Ad−hoc Interactions: Reasoning About Out−Of−Band (OOB) Channels | BibTeX data for Secure Mobile Ad−hoc Interactions: Reasoning About Out−Of−Band (OOB) Channels
-
[33]
Context−Sensitive Requirements and Risk Management with IRIS
Shamal Faily and Ivan Flechais
In International Requirements Engineering‚ 2009. RE'09. 17th IEEE. IEEE. August, 2009.
Details about Context−Sensitive Requirements and Risk Management with IRIS | BibTeX data for Context−Sensitive Requirements and Risk Management with IRIS | Download (pdf) of Context−Sensitive Requirements and Risk Management with IRIS | DOI (10.1109/RE.2009.54)
-
[34]
Usability and Security of Out−Of−Band Channels in Secure Device Pairing Protocols
A. W. Roscoe Ronald Kainda Ivan Flechais
In SOUPS '09: Proceedings of the 5th Symposium on Usable Privacy and Security. 2009.
Details about Usability and Security of Out−Of−Band Channels in Secure Device Pairing Protocols | BibTeX data for Usability and Security of Out−Of−Band Channels in Secure Device Pairing Protocols
-
[35]
Stakeholder involvement‚ motivation‚ responsibility‚ communication: How to design usable security in e−Science
I. Flechais and M. A. Sasse
Vol. 67. No. 4. Pages 281−296. 2009.
Details about Stakeholder involvement‚ motivation‚ responsibility‚ communication: How to design usable security in e−Science | BibTeX data for Stakeholder involvement‚ motivation‚ responsibility‚ communication: How to design usable security in e−Science | Download (pdf) of Stakeholder involvement‚ motivation‚ responsibility‚ communication: How to design usable security in e−Science | DOI (10.1016/j.ijhcs.2007.10.002) | Link to Stakeholder involvement‚ motivation‚ responsibility‚ communication: How to design usable security in e−Science
-
[36]
Making the invisible visible: a theory of security culture for secure and usable grids
Shamal Faily and Ivan Flechais
In UK e−Science All Hands Conference 2008‚ Edinburgh‚ UK (Oral Presentation). 2008.
Details about Making the invisible visible: a theory of security culture for secure and usable grids | BibTeX data for Making the invisible visible: a theory of security culture for secure and usable grids | Download (pdf) of Making the invisible visible: a theory of security culture for secure and usable grids
-
[37]
Human Vulnerabilities in Security Systems
Paul Kearney M. Angela Sasse Debi Ashenden Darren Lawrence Lizzie Coles−Kemp Ivan Flechais
In Human Factors Working Group White Paper‚ Cyber Security KTN Human Factors White Paper. 2007.
Details about Human Vulnerabilities in Security Systems | BibTeX data for Human Vulnerabilities in Security Systems | Download (pdf) of Human Vulnerabilities in Security Systems
-
[38]
Integrating Security and Usability into the Requirements and Design Process
I. Flechais‚ C. Mascolo and M. A. Sasse
In Second International Conference on Global E−Security. 2006.
Details about Integrating Security and Usability into the Requirements and Design Process | BibTeX data for Integrating Security and Usability into the Requirements and Design Process | Download (pdf) of Integrating Security and Usability into the Requirements and Design Process
-
[39]
Divide and Conquer: The Role of Trust and Assurance in the Design of Secure Socio−Technical Systems
I. Flechais‚ J. Riegelsberger and M. A. Sasse
In New Security Paradigms Workshop. 2005.
Details about Divide and Conquer: The Role of Trust and Assurance in the Design of Secure Socio−Technical Systems | BibTeX data for Divide and Conquer: The Role of Trust and Assurance in the Design of Secure Socio−Technical Systems | Download (pdf) of Divide and Conquer: The Role of Trust and Assurance in the Design of Secure Socio−Technical Systems
-
[40]
Designing Secure and Usable Systems
I. Flechais
PhD Thesis University College‚ London. 2005.
Details about Designing Secure and Usable Systems | BibTeX data for Designing Secure and Usable Systems | Download (pdf) of Designing Secure and Usable Systems
-
[41]
Usable Security: What Is It? How Do We Get It?
M. A. Sasse and I. Flechais
In Lorrie Faith Cranor and Simson Garfinkel, editors, Security and Usability: Designing Secure Systems that People can Use. O'Reilly Books. 2005.
Details about Usable Security: What Is It? How Do We Get It? | BibTeX data for Usable Security: What Is It? How Do We Get It?
-
[42]
Bringing Security Home: A Process for Developing Secure and Usable Systems
I. Flechais‚ M. A. Sasse and S. M. V. Hailes
In ACM/SIGSAC New Security Paradigms Workshop. 2003.
Details about Bringing Security Home: A Process for Developing Secure and Usable Systems | BibTeX data for Bringing Security Home: A Process for Developing Secure and Usable Systems | Download (pdf) of Bringing Security Home: A Process for Developing Secure and Usable Systems
-
[43]
Developing Secure and Usable Software
I. Flechais and M. A. Sasse
In OT2003.
Details about Developing Secure and Usable Software | BibTeX data for Developing Secure and Usable Software | Download (pdf) of Developing Secure and Usable Software