The Open University
Browse

Arosha Bandara

Publications

  • Enabling End-Users to Protect Their Privacy
  • Significant Features for Human Activity Recognition Using Tri-Axial Accelerometers
  • Towards Increasing Trust In Expert Evidence Derived From Malware Forensic Tools
  • Designing Tangibles to Support Emotion Logging for Older Adults: Development and Usability Study
  • Loneliness in older people and COVID-19: Applying the social identity approach to digital intervention design
  • A Card-based Ideation Toolkit to Generate Designs for Tangible Privacy Management Tools
  • Attitudes towards Online Community Support Initiatives during the COVID-19 pandemic: A Survey in the UK
  • Security Responses in Software Development
  • Understanding Pedestrians’ Perception of Safety and Safe Mobility Practices
  • EUD-MARS: End-User Development of Model-Driven Adaptive Robotics Software Systems
  • Me, my emotions and I: designing tangibles to support emotion logging for older adults
  • Attitudes towards Online Community Support Initiatives during the COVID-19 Pandemic: A Survey in the UK
  • Evaluating Malware Forensics Tools
  • Designing Tangibles to Support Emotion Logging for Older Adults: Development and Usability Study (Preprint)
  • Socio-Technical Resilience for Community Healthcare
  • Towards a Socio-Technical Understanding of Police-Citizen Interactions
  • Valorising the IoT Databox: creating value for everyone
  • Visual Simple Transformations: Empowering End-Users to Wire Internet of Things Objects
  • Logging you, Logging me: A Replicable Study of Privacy and Sharing Behaviour in Groups of Visual Lifeloggers
  • Identifying Conflicting Requirements in Systems of Systems
  • Feature-driven Mediator Synthesis: Supporting Collaborative Security in the Internet of Things
  • Data Privacy: Users’ Thoughts on Quantified Self Personal Data
  • Requirements and Specifications for Adaptive Security: Concepts and Analysis
  • Assessing the Privacy of mHealth Apps for Self-Tracking: Heuristic Evaluation Approach
  • An Investigation of Security Conversations in Stack Overflow: Perceptions of Security and Community Involvement
  • An Anatomy of Security Conversations in Stack Overflow
  • Engineering Adaptive Software Systems
  • Talking about Security with Professional Developers
  • Hopefully We Are Mostly Secure: Views on Secure Code in Professional Practice
  • The Psychology of Privacy in the Digital Age
  • LiveBox: A Self-Adaptive Forensic-Ready Service for Drones
  • Designing Privacy-aware Internet of Things Applications
  • Taking the Middle Path: Learning About Security Through Online Social Interaction
  • A Sensor Platform for Non-invasive Remote Monitoring of Older Adults in Real Time
  • How are you feeling? Using Tangibles to Log the Emotions of Older Adults
  • Finding & Evaluating Community Policing apps in Asia
  • Towards Citizen Forensics: Improving Citizen-Police Collaboration
  • Designing Technologies for Community Policing
  • Privacy Care: A Tangible Interaction Framework for Privacy Management
  • Up Close and Personal: Exploring User-preferred Image Schemas for Intuitive Privacy Awareness and Control
  • Building trust in digital policing: a scoping review of community policing apps
  • Finding & Reviewing Community Policing Apps in Asia
  • Digital detectives: websleuthing reduces eyewitness identification accuracy in police lineups
  • Understanding Pedestrians’ Perception of Safety and Safe Mobility Practices
  • How Do People Use a Public Gratitude Platform in the Wild?
  • A Card-based Ideation Toolkit to Generate Designs for Tangible Privacy Management Tools
  • Taming App Reliability: Mobile Analytics ‘in the wild’
  • Taming App Reliability: Mobile Analytics “in the wild”
  • Reflections on using the story completion method in designing tangible user interfaces
  • Exploring citizen forensics: witnesses, websleuths, vigilantes and the need for multi-directional channels of online collaboration
  • ContraVision: presenting contrasting visions of future technology
  • Preserving designer input on concrete user interfaces using constraints while maintaining adaptive behavior
  • Contravision: Exploring users' reactions to futuristic technology
  • Learning rules from user behaviour
  • Traceability for adaptive information security in the cloud
  • Requirements-driven mediation for collaborative security
  • Traceability for adaptive information security in the cloud
  • Towards a Framework for Managing Inconsistencies in Systems of Systems
  • Studying location privacy in mobile applications: 'predator vs. prey' probes
  • Policy conflict analysis for diffserv quality of service management
  • From spaces to places: Emerging contexts in mobile privacy
  • Privacy arguments: analysing selective disclosure requirements for mobile applications
  • Adaptive sharing for online social networks: a trade-off between privacy risk and social benefit
  • Teaching cybersecurity at a distance
  • Protecting Privacy in the Cloud: Current Practices, Future Directions
  • From model-driven software development processes to problem diagnoses at runtime
  • Verifiable Limited Disclosure: Reporting and Handling Digital Evidence in Police Investigations
  • Privacy-by-Design Framework for Assessing Internet of Things Applications and Platforms
  • A formal logic approach to firewall packet filtering analysis and generation
  • Expressive policy analysis with enhanced system dynamicity
  • Commentary on ‘Software architectures and mobility: A roadmap’
  • On the impact of real-time feedback on users' behaviour in mobile location-sharing applications
  • “Privacy-shake”: a haptic interface for managing privacy settings in mobile location sharing applications
  • Policy technologies for security management in coalition networks
  • In the best families: tracking and relationships
  • A multi-pronged empirical approach to mobile privacy investigation
  • Security patterns: comparing modeling approaches
  • Requirements-driven mediation for collaborative security
  • Starting with Ubicomp: using the SenseBoard to introduce computing
  • Towards learning to detect meaningful changes in software
  • Using interpreted runtime models for devising adaptive user interfaces of enterprise applications
  • Analysing monitoring and switching problems for adaptive systems
  • Educating the Internet-of-Things generation
  • RBUIS: simplifying enterprise application user interfaces through engineering role-based adaptive behavior
  • Adaptive model-driven user interface development systems
  • Crowdsourcing user interface adaptations for minimizing the bloat in enterprise applications
  • Cedar Studio: an IDE supporting adaptive model-driven user interfaces for enterprise applications
  • Integrating adaptive user interface capabilities in enterprise applications
  • Distilling Privacy Requirements for Mobile Applications
  • “Why can’t I do that?”: tracing adaptive security decisions
  • Teaching software systems thinking at The Open University
  • Personal Informatics for Non-Geeks: Lessons Learned from Ordinary People
  • Privacy Itch and Scratch: On Body Privacy Warnings and Controls
  • Privacy Dynamics: Learning Privacy Norms for Social Software
  • Engineering Adaptive Model-Driven User Interfaces
  • Wearables for Physical Privacy
  • A comparison of MOOC development and delivery approaches
  • PrimAndroid: privacy policy modelling and analysis for Android applications
  • Managing security control assumptions using causal traceability
  • Learning to Share: Engineering Adaptive Decision-Support for Online Social Networks
  • Studying location privacy in mobile applications: 'predator vs. prey' probes
  • Policy refinement for DiffServ quality of service
  • Using Argumentation Logic for Firewall Policy Specification and Analysis
  • A goal-based approach to policy refinement
  • Using event calculus to formalise policy specification and analysis
  • Policy refinement for IP differentiated services quality of service management
  • Towards learning privacy policies
  • Using argumentation logic for firewall configuration management
  • Dynamic policy analysis and conflict resolution for DiffServ quality of service management
  • Policy conflict analysis for quality of service management
  • Policy based management

Usage metrics

Co-workers & collaborators

Tamara Lopez

Tamara Lopez

Arosha Bandara's public data