AB
Publications
- Enabling End-Users to Protect Their Privacy
- Significant Features for Human Activity Recognition Using Tri-Axial Accelerometers
- Towards Increasing Trust In Expert Evidence Derived From Malware Forensic Tools
- Designing Tangibles to Support Emotion Logging for Older Adults: Development and Usability Study
- Loneliness in older people and COVID-19: Applying the social identity approach to digital intervention design
- A Card-based Ideation Toolkit to Generate Designs for Tangible Privacy Management Tools
- Attitudes towards Online Community Support Initiatives during the COVID-19 pandemic: A Survey in the UK
- Security Responses in Software Development
- Understanding Pedestrians’ Perception of Safety and Safe Mobility Practices
- EUD-MARS: End-User Development of Model-Driven Adaptive Robotics Software Systems
- Me, my emotions and I: designing tangibles to support emotion logging for older adults
- Attitudes towards Online Community Support Initiatives during the COVID-19 Pandemic: A Survey in the UK
- Evaluating Malware Forensics Tools
- Designing Tangibles to Support Emotion Logging for Older Adults: Development and Usability Study (Preprint)
- Socio-Technical Resilience for Community Healthcare
- Towards a Socio-Technical Understanding of Police-Citizen Interactions
- Valorising the IoT Databox: creating value for everyone
- Visual Simple Transformations: Empowering End-Users to Wire Internet of Things Objects
- Logging you, Logging me: A Replicable Study of Privacy and Sharing Behaviour in Groups of Visual Lifeloggers
- Identifying Conflicting Requirements in Systems of Systems
- Feature-driven Mediator Synthesis: Supporting Collaborative Security in the Internet of Things
- Data Privacy: Users’ Thoughts on Quantified Self Personal Data
- Requirements and Specifications for Adaptive Security: Concepts and Analysis
- Assessing the Privacy of mHealth Apps for Self-Tracking: Heuristic Evaluation Approach
- An Investigation of Security Conversations in Stack Overflow: Perceptions of Security and Community Involvement
- An Anatomy of Security Conversations in Stack Overflow
- Engineering Adaptive Software Systems
- Talking about Security with Professional Developers
- Hopefully We Are Mostly Secure: Views on Secure Code in Professional Practice
- The Psychology of Privacy in the Digital Age
- LiveBox: A Self-Adaptive Forensic-Ready Service for Drones
- Designing Privacy-aware Internet of Things Applications
- Taking the Middle Path: Learning About Security Through Online Social Interaction
- A Sensor Platform for Non-invasive Remote Monitoring of Older Adults in Real Time
- How are you feeling? Using Tangibles to Log the Emotions of Older Adults
- Finding & Evaluating Community Policing apps in Asia
- Towards Citizen Forensics: Improving Citizen-Police Collaboration
- Designing Technologies for Community Policing
- Privacy Care: A Tangible Interaction Framework for Privacy Management
- Up Close and Personal: Exploring User-preferred Image Schemas for Intuitive Privacy Awareness and Control
- Building trust in digital policing: a scoping review of community policing apps
- Finding & Reviewing Community Policing Apps in Asia
- Digital detectives: websleuthing reduces eyewitness identification accuracy in police lineups
- Understanding Pedestrians’ Perception of Safety and Safe Mobility Practices
- How Do People Use a Public Gratitude Platform in the Wild?
- A Card-based Ideation Toolkit to Generate Designs for Tangible Privacy Management Tools
- Taming App Reliability: Mobile Analytics ‘in the wild’
- Taming App Reliability: Mobile Analytics “in the wild”
- Reflections on using the story completion method in designing tangible user interfaces
- Exploring citizen forensics: witnesses, websleuths, vigilantes and the need for multi-directional channels of online collaboration
- ContraVision: presenting contrasting visions of future technology
- Preserving designer input on concrete user interfaces using constraints while maintaining adaptive behavior
- Contravision: Exploring users' reactions to futuristic technology
- Learning rules from user behaviour
- Traceability for adaptive information security in the cloud
- Requirements-driven mediation for collaborative security
- Traceability for adaptive information security in the cloud
- Towards a Framework for Managing Inconsistencies in Systems of Systems
- Studying location privacy in mobile applications: 'predator vs. prey' probes
- Policy conflict analysis for diffserv quality of service management
- From spaces to places: Emerging contexts in mobile privacy
- Privacy arguments: analysing selective disclosure requirements for mobile applications
- Adaptive sharing for online social networks: a trade-off between privacy risk and social benefit
- Teaching cybersecurity at a distance
- Protecting Privacy in the Cloud: Current Practices, Future Directions
- From model-driven software development processes to problem diagnoses at runtime
- Verifiable Limited Disclosure: Reporting and Handling Digital Evidence in Police Investigations
- Privacy-by-Design Framework for Assessing Internet of Things Applications and Platforms
- A formal logic approach to firewall packet filtering analysis and generation
- Expressive policy analysis with enhanced system dynamicity
- Commentary on ‘Software architectures and mobility: A roadmap’
- On the impact of real-time feedback on users' behaviour in mobile location-sharing applications
- “Privacy-shake”: a haptic interface for managing privacy settings in mobile location sharing applications
- Policy technologies for security management in coalition networks
- In the best families: tracking and relationships
- A multi-pronged empirical approach to mobile privacy investigation
- Security patterns: comparing modeling approaches
- Requirements-driven mediation for collaborative security
- Starting with Ubicomp: using the SenseBoard to introduce computing
- Towards learning to detect meaningful changes in software
- Using interpreted runtime models for devising adaptive user interfaces of enterprise applications
- Analysing monitoring and switching problems for adaptive systems
- Educating the Internet-of-Things generation
- RBUIS: simplifying enterprise application user interfaces through engineering role-based adaptive behavior
- Adaptive model-driven user interface development systems
- Crowdsourcing user interface adaptations for minimizing the bloat in enterprise applications
- Cedar Studio: an IDE supporting adaptive model-driven user interfaces for enterprise applications
- Integrating adaptive user interface capabilities in enterprise applications
- Distilling Privacy Requirements for Mobile Applications
- “Why can’t I do that?”: tracing adaptive security decisions
- Teaching software systems thinking at The Open University
- Personal Informatics for Non-Geeks: Lessons Learned from Ordinary People
- Privacy Itch and Scratch: On Body Privacy Warnings and Controls
- Privacy Dynamics: Learning Privacy Norms for Social Software
- Engineering Adaptive Model-Driven User Interfaces
- Wearables for Physical Privacy
- A comparison of MOOC development and delivery approaches
- PrimAndroid: privacy policy modelling and analysis for Android applications
- Managing security control assumptions using causal traceability
- Learning to Share: Engineering Adaptive Decision-Support for Online Social Networks
- Studying location privacy in mobile applications: 'predator vs. prey' probes
- Policy refinement for DiffServ quality of service
- Using Argumentation Logic for Firewall Policy Specification and Analysis
- A goal-based approach to policy refinement
- Using event calculus to formalise policy specification and analysis
- Policy refinement for IP differentiated services quality of service management
- Towards learning privacy policies
- Using argumentation logic for firewall configuration management
- Dynamic policy analysis and conflict resolution for DiffServ quality of service management
- Policy conflict analysis for quality of service management
- Policy based management