Publications

Below, you will find our list of publications with links to the papers. If you cannot find or access a paper, contact us.

2019

  • G. W. Tigwell, Z. Sarsenbayeva, B. M. Gorman, D. R. Flatla, J. Goncalves, Y. Yesilada, and J. O. Wobbrock, “Addressing the challenges of situationally-induced impairments and disabilities in mobile interaction,” in Extended abstracts of the 2019 chi conference on human factors in computing systems, 2019. 
  • A. M’manga, S. Faily, J. McAlaney, and C. Williams, “A Normative Decision Making Model for Cyber Security,” Information & Computer Security, 2019. 
  • J. Henriksen-Bulmer, S. Faily, and S. Jeary, “Privacy Risk Assessment in Context: A Meta-Model based on Contextual Integrity,” Computers & Security, 2019. 
  • G. Veale, H. Dogan, and J. Murphy, “Development and usability evaluation of a nutrition and lifestyle guidance application for people living with and beyond cancer.” 2019. 
  • M. Corner, H. Dogan, A. Mylonas, and F. Djabri, “A usability evaluation of privacy add-ons for web browsers.” 2019. 
  • P. Whittington, H. Dogan, N. Jiang, and K. Phalp, “The development and evaluation of the smartability android application to detect users’ abilities.” 2019. 
  • S. Alamro, H. Dogan, K. Phalp, and R. Ali, “Template-driven documentation for enterprise recruitment best practices.” 2019. 
  • R. Bond, K. Boyd, A. Vertesia, H. Dogan, and J. Magee, “How users judge the usability of a user interface at different time points: is there evidence for memory decay, recall bias or temporal bias?,” Interacting with computers (accepted), 2019. 
  •  A. Alrobai, A. Algashami, H. Dogan, T. Corner, K. Phalp, and R. Ali, “Cope.er method: combating digital addiction via online peer support groups,” International journal of environmental research and public health, vol. 16, 2019. 
  •  S. Thomas, A. Pulman, P. Thomas, S. Collard, N. Jiang, H. Dogan, A. Davies Smith, S. Hourihan, F. Roberts, P. Kersten, K. Pretty, J. Miller, K. Stanley, and M-C. Gay, “Digitising a face-to-face group fatigue management programme – exploring the views of people with multiple sclerosis and health care professionals via interviews and consultation groups,” Journal of medical internet research (jmir) formative research, 2019. 
  •  B. Fan, J. Ma, N. Jiang, H. Dogan, and R. Ali, “A rule based reasoning system for initiating passive adas warnings without driving distraction through an ontological approach,” in Proceedings – 2018 ieee international conference on systems, man, and cybernetics, smc 2018, 2019, p. 3511–3517.

2018

  • P. Whittington, H. Dogan, N. Jiang, and K. T. Phalp, “Smartability: detection of reduced physical abilities through smartphone sensors,” , 2018. 
  • P. Whittington, H. Dogan, N. Jiang, and K. T. Phalp, “Automatic detection of user abilities through the smartability framework,” , 2018. 
  • D. Ki-Aries, S. Faily, H. Dogan, and C. Williams, “Assessing System of Systems Security Risk and Requirements with OASoSIS,” in 2018 ieee 5th international workshop on evolving security & privacy requirements engineering (espre), 2018, p. 14–20. 
  • D. Ki-Aries, “Assessing security risk and requirements for systems of systems,” in 2018 ieee 26th international requirements engineering conference (re), 2018, p. 454–459. 
  • J. Henriksen-Bulmer, S. Faily, and V. Katos, “Translating Contextual Integrity into Practice using CLIFOD,” in Proceedings of the 2018 Networked Privacy Workshop at CSCW, 2018. 
  • A. M’manga, S. Faily, J. McAlaney, and C. Williams, “Rationalising Decision Making about Risk: A Normative Approach,” in Proceedings of the 12th International Symposium on Human Aspects of Information Security & Assurance, 2018. 
  • S. Faily, Designing Usable and Secure Software with IRIS and CAIRIS, 1st ed., Springer, 2018. 
  • A. Atzeni, S. Faily, and R. Galloni, “Usable Security,” in Encyclopedia of information science and technology, 4th ed., M. Khosrow-Pour, Ed., IGI Global, 2018, p. 5004–5013. 
  •  S. Alamro, H. Dogan, D. Cetinkaya, N. Jiang, and K. Phalp, “Conceptualising and modelling e-recruitment process for enterprises through a problem oriented approach,” Information (switzerland), vol. 9, 2018. 
  • A. Vertesi, H. Dogan, A. Stefanidis, G. Ashton, and W. Drake, “Usability evaluation of a virtual learning environment: a university case study,” in Proceedings of the 15th international conference on cognition and exploratory learning in the digital age, celda 2018, 2018, p. 11–20. 
  • H. Dogan, A. Alrobai, H. Norman, N. Jiang, N. Nordin, and A. Adnan, “Exploring a framework of online intervention features for facebook addiction in postgraduate education,” Behaviour and information technology (in review), 2018. 
  • N. Jiang and H. Dogan, “Tapcha: an invisible captcha scheme.” 2018. 
  • P. Whittington, H. Dogan, N. Jiang, and K. Phalp, “Smartability: detection of reduced physical abilities through smartphone sensors.” 2018. 
  •  S. Ambore, C. Richardson, E. Apeh, and H. Dogan, “Have usability and security trade-offs in mobile financial services become untrustworthy?,” in Proceedings of the 32nd international bcs human computer interaction conference, hci 2018, 2018. 
  • B. Fairbanks, A. Pulman, H. Dogan, N. Jiang, K. Pretty, P. Thomas, and S. Thomas, “Creating a facets digital toolkit to promote quality of life of people with multiple sclerosis through participatory design.” 2018. 
  •  P. Whittington, H. Dogan, N. Jiang, and K. Phalp, “Automatic detection of user abilities through the smartability framework,” in Proceedings of the 32nd international bcs human computer interaction conference, hci 2018, 2018. 
  •  B. Fan, N. Jiang, H. Dogan, R. Ali, and J. Ma, “An ontological approach to inform hmi designs for minimising driver distractions with adas,” in Proceedings of the 32nd international bcs human computer interaction conference, hci 2018, 2018. 
  • H. Dogan, N. Jiang, S. Giff, and R. Bond, “Proceedings of the 2nd workshop on human centred design for intelligent environments (hcd4ie),” in Co-located with the 32nd british human computer interaction conference, ACM, 2018. 
  • A. Pulman, S. Collard, J. Miller, P. Thomas, N. Jiang, H. Dogan, P. kersten, M-C. gay, A. davies-smith, S. hourihan, F. roberts, K. Stanley, K. Pretty, and S. Thomas, “Consultation on delivering an ms-fatigue management group programme in an online format (cfacets),” Bournemouth 2018. 
  •  A. Alrobai, H. Dogan, K. Phalp, and R. Ali, “Building online platforms for peer support groups as a persuasive behavior change technique,” in Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics), 2018, p. 70–83. 
  • S. Alamro, H. Dogan, D. Cetinkaya, and N. Jiang, “Problem-oriented conceptual model and ontology for enterprise e-recruitment,” in Iceis 2018 – proceedings of the 20th international conference on enterprise information systems, 2018, p. 280–289.

2017

  • P. Whittington and H. Dogan, “Smartpowerchair: characterization and usability of a pervasive system of systems,” Ieee transactions on human-machine systems, vol. 47, iss. 4, p. 500–510, 2017. 
  • D. Ki-Aries, H. Dogan, S. Faily, P. Whittington, and C. Williams, “From Requirements to Operation: Components for Risk Assessment in a Pervasive System of Systems,” in 2017 IEEE 25th International Requirements Engineering Conference Workshops (REW)-Proceedings of 4th International Workshop on Evolving Security & Privacy Requirements Engineering, 2017, p. 83–89. 
  • D. Ki-Aries and S. Faily, “Persona-Centred Information Security Awareness,” Computers & security, vol. 70, p. 663–674, 2017. 
  • D. Ki-Aries and S. Faily, “Persona-centred information security awareness,” Computers & security, vol. 70, iss. Supplement C, pp. 663-674, 2017. 
  • P. Whittington and H. Dogan, “Human factors in transportation cyber physical system,” in Transportation cyber physical system, M. Chowdhury and L. Deka, Eds., Elsevier, 2017. 
  •  H. South, M. Taylor, H. Dogan, and N. Jiang, “Digitising a medical clerking system with multimodal interaction support,” in Icmi 2017 – proceedings of the 19th acm international conference on multimodal interaction, 2017, p. 238–242. 
  •  N. Jiang, H. Dogan, and F. Tian, “Designing mobile friendly captchas: an exploratory study,” in Hci 2017: digital make believe – proceedings of the 31st international bcs human computer interaction conference, hci 2017, 2017, p. 1–7. 
  •  P. Whittington and H. Dogan, “Smartpowerchair: characterization and usability of a pervasive system of systems,” Ieee transactions on human-machine systems, vol. 47, p. 500–510, 2017. 
  •  J. Ward, H. Dogan, E. Apeh, A. Mylonas, and V. Katos, “Using human factor approaches to an organisation’s bring your own device scheme,” in Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics), 2017, p. 396–413. 
  • H. Thackray, C. Richardson, H. Dogan, J. Taylor, and J. McAlaney, “Surveying the hackers: the challenges of data collection from a secluded community,” in European conference on information warfare and security, eccws, 2017, p. 745–748. 
  • S. Ambore, E. Apeh, H. Dogan, C. Richardson, and D. Osselton, “Development of human factors and cybersecurity objectives for mobile financial service (mfs).” 2017.

2016

  • P. Whittington, “Improving user interaction through a smartdisability framework,” in Proceedings of the 30th international bcs human computer interaction conference: fusion!, 2016, p. 8. 
  • P. Whittington and H. Dogan, “A smartdisability framework: enhancing user interaction,” in Proceedings of the 30th international bcs human computer interaction conference: fusion!, 2016, p. 24. 
  • P. Whittington and H. Dogan, “Smartdisability: a smart system of systems approach to disability,” in 2016 11th system of systems engineering conference (sose), 2016, p. 1–6. 
  • D. Ki-Aries, S. Faily, and K. Beckers, “Persona-driven information security awareness,” in Proceedings of the 30th international bcs human computer interaction conference: companion volume, 2016, p. 37. 
  • S. Faily, D. Power, and I. Fléchais, “Gulfs of Expectation: Eliciting and Verifying Differences in Trust Expectations using Personas,” Journal of trust management, vol. 3, iss. 4, pp. 1-22, 2016. 
  • S. Faily, G. Lykou, A. Partridge, D. Gritzalis, A. Mylonas, and V. Katos, “Human-Centered Specification Exemplars for Critical Infrastructure Environments,” in Proceedings of the 30th British HCI Group Annual Conference on People and Computers, 2016. 
  • E. Bolat, H. Dogan, D. Biggins, M. Dupac, and E. Crowley, “Empowering university students through online multiple choice questions.” 2016, p. 4187–4193. 
  • S. Faily, N. Jiang, H. Dogan, and J. Taylor, Proceedings of the 30th international bcs human computer interaction conference (hci 2016), British Computer Society, 2016. 
  •  A. Alrobai, J. McAlaney, H. Dogan, K. Phalp, and R. Ali, “Exploring the requirements and design of persuasive intervention technology to combat digital addiction,” in Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics), 2016, p. 130–150. 
  • H. Bouchachia, H. Dogan, N. Jiang, and S. Giff, “Human-centred design for intelligent environments.” , 2016, vol. 2016-July. 
  •  S. Giff and H. Dogan, “Ux research is dead. long live ux research!,” in Proceedings of the 30th international bcs human computer interaction conference, hci 2016, 2016. 
  •  H. Thackray, J. McAlaney, H. Dogan, J. Taylor, and C. Richardson, “Social psychology: an under-used tool in cybersecurity,” in Proceedings of the 30th international bcs human computer interaction conference, hci 2016, 2016. 
  • B. Scott, H. Dogan, and N. Jiang, “Examining the effects of lighting effects on peripheral devices for visual user notifications,” in Proceedings of the 30th international bcs human computer interaction conference, hci 2016, 2016. 
  • S. Ambore, C. Richardson, H. Dogan, E. Apeh, and D. Osselton, “A “soft” approach to analysing mobile financial services socio-technical systems,” in Proceedings of the 30th international bcs human computer interaction conference, hci 2016, 2016. 
  •  P. Whittington and H. Dogan, “A smartdisability framework: enhancing user interaction,” in Proceedings of the 30th international bcs human computer interaction conference, hci 2016, 2016. 
  •  P. Whittington and H. Dogan, “Smart disability: a smart system of systems approach to disability,” in 2016 11th systems of systems engineering conference, sose 2016, 2016.

2015

  • P. Whittington and H. Dogan, “Smartpowerchair: a pervasive system of systems,” in 2015 10th system of systems engineering conference (sose), 2015, p. 244–249. 
  • P. Whittington, H. Dogan, and K. Phalp, “Evaluating the usability of an automated transport and retrieval system,” in 2015 international conference on pervasive and embedded computing and communication systems (peccs), 2015, p. 49–66. 
  • P. Whittington, H. Dogan, and K. Phalp, “Smartpowerchair: to boldly go where a powerchair has not gone before,” in In proc. proceedings of the international conference on ergonomics & human factors 2015, 2015, p. 233–240. 
  • S. Faily, “Engaging stakeholders during late stage security design with assumption personas,” Information and computer security, vol. 23, iss. 4, p. 435–446, 2015. 
  • M. Favale, N. McDonald, S. Faily, and C. Gatzidis, “Human aspects in digital rights management: the perspectives of content developers,” in Fourth international workshop on artificial intelligence and ip law, 2015. 
  • A. Vallindras and S. Faily, “The Mystery of Security Design,” in Proceedings of the 2015 British Human Computer Interaction Conference , 2015, p. 316–317. 
  • S. Faily, J. Lyle, I. Fléchais, and A. Simpson, “Usability and Security by Design: A Case Study in Research and Development,” in Proceedings of the ndss workshop on usable security, 2015. 
  • S. Faily, G. Stergiopoulos, V. Katos, and D. Gritzalis, ““Water, Water, Every Where”: Nuances for a Water Industry Critical Infrastructure Specification Exemplar,” in Proceedings of the 10th International Conference on Critical Information Infrastructures Security, 2015, p. 243–246. 
  •  H. Dogan, S. Alamro, and K. Phalp, “Forming enterprise recruitment pattern based on problem-oriented conceptual model,” Procedia computer science, vol. 64, p. 298–305, 2015. 
  •  D. Biggins, E. Crowley, E. Bolat, M. Dupac, and H. Dogan, “Enhancing university student engagement using online multiple choice questions and answers,” Open journal of social sciences, p. 71–76, 2015. 
  • D. Biggins, E. Crowley, E. Bolat, M. Dupac, and H. Dogan, “Using peerwise to improve engagement and learning..” 2015, p. 585–602. 
  • H. Norman, H. Dogan, N. Nordin, and L. Halim, “An asia-europe massive open online course for lecturer training: development of pedagogical strategies for moocs.” 2015. 
  • P. Whittington and H. Dogan, “Improving life for people with disabilities,” The ergonomist, vol. 47, p. 12–13, 2015. 
  •  N. Jiang and H. Dogan, “A gesture-based captcha design supporting mobile devices,” in Acm international conference proceeding series, 2015, p. 202–207. 
  • P. Whittington, H. Dogan, and K. Phalp, “Smartpowerchair: to boldly go where a powerchair has not gone before,” in Contemporary ergonomics and human factors 2015, 2015, p. 233–242. 
  • P. Whittington, H. Dogan, and K. Phalp, “Evaluating the usability of an automated transport and retrieval system,” in Peccs 2015 – 5th international conference on pervasive and embedded computing and communication systems, proceedings, 2015, p. 59–66. 
  • H. Norman, N. Nordin, R. Din, M. Ally, and H. Dogan, “Exploring the roles of social participation in mobile social media learning: a social network analysis,” International review of research in open and distance learning, vol. 16, p. 205–224, 2015. 
  • A. Alrobai and H. Dogan, “Digital addiction ontology for social networking systems.” , 2015, vol. 8852, p. 167–175.

2014

  • S. Faily, J. Lyle, I. Fléchais, A. Atzeni, C. Cameroni, H. Myrhaug, A. Göker, and R. Kleinfeld, “Authorisation in context: incorporating context-sensitivity into an access control framework,” in Proceedings of the 28th international bcs human computer interaction conference on hci 2014 – sand, sea and sky – holiday hci, UK, 2014, p. 189–194. 
  • S. Faily and I. Fléchais, “Eliciting and Visualising Trust Expectations using Persona Trust Characteristics and Goal Models,” in Proceedings of the 6th International Workshop on Social Software Engineering, 2014, p. 17–24. 
  • S. Faily, J. Lyle, and A. Simpson, “Security and Usability Design for Research and Development: A Case Study,” Computer journal, 2014. 
  • N. Jiang and H. Dogan, “Crowdhilite: a peer review service to support serious reading on the screen,” in Proceedings of the 28th international bcs human computer interaction conference: sand, sea and sky – holiday hci, hci 2014, 2014, p. 323–328. 
  • H. Dogan, M. Sinclair, and N. Jiang, “Human factors for systems of systems (workshop).” 2014.