Publications

Below, you will find our list of publications with links to the papers. If you cannot find or access a paper, contact us.

2022

  • Heaslip, V., Green, S., Simkhada, B., Dogan, H. and Richer, S., 2022. How do people who are homeless find out about local health and social care services: A mixed method study. International Journal of Environmental Research and Public Health, 19 (1).
  • Adesina, N., Dogan, H., Green, S. and Tsofliou, F., 2022. Effectiveness and usability of digital tools to support dietary self-management of gestational diabetes mellitus: A systematic review. Nutrients, 14 (1).

2021

  • Thomas, S., Pulman, A., Dogan, H., Jiang, N., Passmore, D., Pretty, K., Fairbanks, B., Smith, A.D. and Thomas, P.W., 2021. Creating a Digital Toolkit to Reduce Fatigue and Promote Quality of Life in Multiple Sclerosis: Participatory Design and Usability Study. JMIR Formative Research, 5 (12).
  • Swanston, E., Pulman, A., Dogan, H., Murphy, J. and Bitters, F., 2021. Scoping the need for a tailored mhealth app to improve health and well-being behavioral transformation in the police: Exploring the views of uk police workers via web-based surveys and client meetings. JMIR Formative Research, 5 (8).
  • Heaslip, V., Richer, S., Simkhada, B., Dogan, H. and Green, S., 2021. Use of technology to promote health and wellbeing of people who are homeless: A systematic review. International Journal of Environmental Research and Public Health, 18 (13).
  • Naiseh, M., Cemiloglu, D., Al Thani, D., Jiang, N. and Ali, R., 2021. Explainable Recommendations and Calibrated Trust: Two Systematic User Errors. Computer, 54 (10), 28-37.
  • Naiseh, M., Al-Thani, D., Jiang, N. and Ali, R., 2021. Explainable recommendation: when design meets trust calibration. World Wide Web, 24 (5), 1857-1884.
  • Gorman, B.M., Crabb, M. and Armstrong, M., 2021. Adaptive subtitles: Preferences and trade-ofs in real-time media adaption. Conference on Human Factors in Computing Systems – Proceedings.
  • Lilly, B., Cetinkaya, D. and Durak, U., 2021. Tracking light aircraft with smartphones at low altitudes. Information (Switzerland), 12 (3), 1-28.
  • Anwary, A.R., Cetinkaya, D., Vassallo, M. and Bouchachia, H., 2021. Smart-Cover: A real time sitting posture monitoring system. Sensors and Actuators, A: Physical, 317.
  • Aldoayan, M., Sahandi, R., John, D. and Cetinkaya, D., 2021. Critical issues, challenges and opportunities for cloud-based collaborative online course provision. International Journal of Learning Technology, 16 (2), 109-133.
  • Faily, S., Iacob, C., Ali, R. and Ki-Aries, D., 2021. Visualising personas as goal models to find security tensions. Information and Computer Security, 29 (5), 787-815.
  • Mavengere, N.B., Henriksen-Bulmer, J., Passmore, D., Mayes, H., Fakorede, O., Coles, M. and Atfield-Cutts, S., 2021. Applying innovative technologies and practices in the rapid shift to remote learning. Communications of the Association for Information Systems, 48, 185-195.
  • Almilaji, O., Engen, V., Thomas, P. and Snook, J., 2021. The development of a web-based applicaation to predict the risk of GI cancer in IDA. GUT, 70, A37-A38.
  • Shi, L., Wang, C.Y., Tian, F. and Jia, H.B., 2021. An integrated neural network model for pupil detection and tracking. Soft Computing, 25 (15), 10117-10127.
  • Lei, S., Dong, B., Li, Y., Xiao, F. and Tian, F., 2021. Iris recognition based on few-shot learning. Computer Animation and Virtual Worlds, 32 (3-4).
  • Wu, Z., Wang, X., Liu, S., Chen, Q., Seah, H.S. and Tian, F., 2021. Skeleton-Based Parametric 2-D Region Representation: Disk B-Spline Curves. IEEE Computer Graphics and Applications, 41 (3), 59-70.
  • Chen, L., Han, J. and Tian, F., 2021. Infrared and visible image fusion using two-layer generative adversarial network. Journal of Intelligent and Fuzzy Systems, 40 (6), 11897-11913.
  • Chen, L., Han, J. and Tian, F., 2021. Colorization of fusion image of infrared and visible images based on parallel generative adversarial network approach. Journal of Intelligent and Fuzzy Systems, 41 (1), 2255-2264.

2020

  • P. Whittington, H. Dogan, K. Phalp, and N. Jiang, “Detecting physical abilities through smartphone sensors: an assistive technology application” in Disability and Rehabilitation: Assistive Technology, 2020.
  • A.U. Alrubaee, D. Cetinkaya, G. Liebchen, and H. Dogan, “A process model for component-based model-driven software development” in Information (Switzerland), 11 (6), 2020.
  • A. Vertesi, H. Dogan, and A. Stefanidis, “Usability Evaluation of Virtual Learning Environments: A University Case Study. Online Teaching and Learning in Higher Education” in Cognition and Exploratory Learning in the Digital Age. Springer, Cham, 161-183, 2020.
  • C. Cross, D. Cetinkaya, and H. Dogan, “Transforming diagrams’ semantics to text for visually impaired”, 339-350, 2020.
  • C. Corbin, D. Cetinkaya, and H. Dogan, “Design and Development of a Web Extension to Help Facilitate the Learning of a Foreign Language”, 345-364, 2020.
  • M.A.B Naseir, H. Dogan, E. Apeh, and R. Ali, “National cybersecurity capacity building framework for countries in a transitional phase”, 841-849, 2020.
  • A. Altaf, S. Faily, H. Dogan, A. Mylonas, and E. Thron “Identifying safety and human factors issues in rail using IRIS and CAIRIS”, 98-107, 2020.
  • M. Naiseh, N. Jiang, J. Ma, and R. Ali, “Personalising explainable recommendations: Literature and conceptualisation”, 518-533, 2020.
  • M. Naiseh, N. Jiang, J. Ma, and R. Ali, “Explainable Recommendations in Intelligent Systems: Delivery Methods, Modalities and Risks”, 212-228, 2020.
  • K. Appleton, K., D. Passmore, I. Burn, H. Pidgeon, P. Nation, C. Boobyer, and N. Jiang, “A smart phone application for increasing fruit and vegetable knowledge and intakes: Development and inital testing”, E524, 2020.
  • R. Menzies, B.M. Gorman, and G.W. Tigwell, “Reflections on Using Chat-Based Platforms for Online Interviews with Screen-Reader Users”, 2020.
  • G.W. Tigwell, B.M. Gorman, and R. Menzies, “Emoji Accessibility for Visually Impaired People”, 2020.
  • K. Potapova, D. Cetinkaya, and G. Liebchen, “Monitoring and Controlling Phone Usage to Raise Awareness and Combat Digital Addiction” in BESC’20 The 7th International Conference on Behavioural and Social Computing, 5-7 November 2020 Bournemouth, UK, 2020.
  • J. Henriksen-Bulmer, S. Faily and S. Jeary, “DPIA in context: Applying DPIA to assess privacy risks of cyber physical systems” in Future Internet, 12 (5), 2020.
  • S. Faily, C. Iacob, R. Ali, and D. Ki-Aries, “Identifying Implicit Vulnerabilities through Personas as Goal Models” in: 4th International Workshop on SECurity and Privacy Requirements Engineering (SECPRE 2020), 14-18 September 2020 Virtual. Springer, 2020.
  • S. Faily, R. Scandariato, A. Shostack, L. Sion, and D. Ki-Aries, “Contextualisation of Data Flow Diagrams for security analysis” in 7th International Workshop on Graphical Models for Security, 22 June 2020, Boston, USA. Springer, 2020.
  • C. Iacob, and S. Faily, “The impact of undergraduate mentorship on student satisfaction and engagement, teamwork performance, and team dysfunction in a software engineering group project”, 128-134.
  • A. Altaf, S. Faily, H. Dogan, A. Mylonas, and E. Thron, “Identifying safety and human factors issues in rail using IRIS and CAIRIS”, 98-107.
  • S. Faily, R. Scandariato, A. Shostack, L. Sion, and D. Ki-Aries, “Contextualisation of Data Flow Diagrams for Security Analysis”. Springer, 186-197.

2019

  • G. W. Tigwell, Z. Sarsenbayeva, B. M. Gorman, D. R. Flatla, J. Goncalves, Y. Yesilada, and J. O. Wobbrock, “Addressing the challenges of situationally-induced impairments and disabilities in mobile interaction,” in Extended abstracts of the 2019 chi conference on human factors in computing systems, 2019. 
  • A. M’manga, S. Faily, J. McAlaney, and C. Williams, “A Normative Decision Making Model for Cyber Security,” Information & Computer Security, 2019. 
  • J. Henriksen-Bulmer, S. Faily, and S. Jeary, “Privacy Risk Assessment in Context: A Meta-Model based on Contextual Integrity,” Computers & Security, 2019. 
  • G. Veale, H. Dogan, and J. Murphy, “Development and usability evaluation of a nutrition and lifestyle guidance application for people living with and beyond cancer.” 2019. 
  • M. Corner, H. Dogan, A. Mylonas, and F. Djabri, “A usability evaluation of privacy add-ons for web browsers.” 2019. 
  • P. Whittington, H. Dogan, N. Jiang, and K. Phalp, “The development and evaluation of the smartability android application to detect users’ abilities.” 2019. 
  • S. Alamro, H. Dogan, K. Phalp, and R. Ali, “Template-driven documentation for enterprise recruitment best practices.” 2019. 
  • R. Bond, K. Boyd, A. Vertesia, H. Dogan, and J. Magee, “How users judge the usability of a user interface at different time points: is there evidence for memory decay, recall bias or temporal bias?,” Interacting with computers (accepted), 2019. 
  •  A. Alrobai, A. Algashami, H. Dogan, T. Corner, K. Phalp, and R. Ali, “Cope.er method: combating digital addiction via online peer support groups,” International journal of environmental research and public health, vol. 16, 2019. 
  •  S. Thomas, A. Pulman, P. Thomas, S. Collard, N. Jiang, H. Dogan, A. Davies Smith, S. Hourihan, F. Roberts, P. Kersten, K. Pretty, J. Miller, K. Stanley, and M-C. Gay, “Digitising a face-to-face group fatigue management programme – exploring the views of people with multiple sclerosis and health care professionals via interviews and consultation groups,” Journal of medical internet research (jmir) formative research, 2019. 
  •  B. Fan, J. Ma, N. Jiang, H. Dogan, and R. Ali, “A rule based reasoning system for initiating passive adas warnings without driving distraction through an ontological approach,” in Proceedings – 2018 ieee international conference on systems, man, and cybernetics, smc 2018, 2019, p. 3511–3517.

2018

  • P. Whittington, H. Dogan, N. Jiang, and K. T. Phalp, “Smartability: detection of reduced physical abilities through smartphone sensors,” , 2018. 
  • P. Whittington, H. Dogan, N. Jiang, and K. T. Phalp, “Automatic detection of user abilities through the smartability framework,” , 2018. 
  • D. Ki-Aries, S. Faily, H. Dogan, and C. Williams, “Assessing System of Systems Security Risk and Requirements with OASoSIS,” in 2018 ieee 5th international workshop on evolving security & privacy requirements engineering (espre), 2018, p. 14–20. 
  • D. Ki-Aries, “Assessing security risk and requirements for systems of systems,” in 2018 ieee 26th international requirements engineering conference (re), 2018, p. 454–459. 
  • J. Henriksen-Bulmer, S. Faily, and V. Katos, “Translating Contextual Integrity into Practice using CLIFOD,” in Proceedings of the 2018 Networked Privacy Workshop at CSCW, 2018. 
  • A. M’manga, S. Faily, J. McAlaney, and C. Williams, “Rationalising Decision Making about Risk: A Normative Approach,” in Proceedings of the 12th International Symposium on Human Aspects of Information Security & Assurance, 2018. 
  • S. Faily, Designing Usable and Secure Software with IRIS and CAIRIS, 1st ed., Springer, 2018. 
  • A. Atzeni, S. Faily, and R. Galloni, “Usable Security,” in Encyclopedia of information science and technology, 4th ed., M. Khosrow-Pour, Ed., IGI Global, 2018, p. 5004–5013. 
  •  S. Alamro, H. Dogan, D. Cetinkaya, N. Jiang, and K. Phalp, “Conceptualising and modelling e-recruitment process for enterprises through a problem oriented approach,” Information (switzerland), vol. 9, 2018. 
  • A. Vertesi, H. Dogan, A. Stefanidis, G. Ashton, and W. Drake, “Usability evaluation of a virtual learning environment: a university case study,” in Proceedings of the 15th international conference on cognition and exploratory learning in the digital age, celda 2018, 2018, p. 11–20. 
  • H. Dogan, A. Alrobai, H. Norman, N. Jiang, N. Nordin, and A. Adnan, “Exploring a framework of online intervention features for facebook addiction in postgraduate education,” Behaviour and information technology (in review), 2018. 
  • N. Jiang and H. Dogan, “Tapcha: an invisible captcha scheme.” 2018. 
  • P. Whittington, H. Dogan, N. Jiang, and K. Phalp, “Smartability: detection of reduced physical abilities through smartphone sensors.” 2018. 
  •  S. Ambore, C. Richardson, E. Apeh, and H. Dogan, “Have usability and security trade-offs in mobile financial services become untrustworthy?,” in Proceedings of the 32nd international bcs human computer interaction conference, hci 2018, 2018. 
  • B. Fairbanks, A. Pulman, H. Dogan, N. Jiang, K. Pretty, P. Thomas, and S. Thomas, “Creating a facets digital toolkit to promote quality of life of people with multiple sclerosis through participatory design.” 2018. 
  •  P. Whittington, H. Dogan, N. Jiang, and K. Phalp, “Automatic detection of user abilities through the smartability framework,” in Proceedings of the 32nd international bcs human computer interaction conference, hci 2018, 2018. 
  •  B. Fan, N. Jiang, H. Dogan, R. Ali, and J. Ma, “An ontological approach to inform hmi designs for minimising driver distractions with adas,” in Proceedings of the 32nd international bcs human computer interaction conference, hci 2018, 2018. 
  • H. Dogan, N. Jiang, S. Giff, and R. Bond, “Proceedings of the 2nd workshop on human centred design for intelligent environments (hcd4ie),” in Co-located with the 32nd british human computer interaction conference, ACM, 2018. 
  • A. Pulman, S. Collard, J. Miller, P. Thomas, N. Jiang, H. Dogan, P. kersten, M-C. gay, A. davies-smith, S. hourihan, F. roberts, K. Stanley, K. Pretty, and S. Thomas, “Consultation on delivering an ms-fatigue management group programme in an online format (cfacets),” Bournemouth 2018. 
  •  A. Alrobai, H. Dogan, K. Phalp, and R. Ali, “Building online platforms for peer support groups as a persuasive behavior change technique,” in Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics), 2018, p. 70–83. 
  • S. Alamro, H. Dogan, D. Cetinkaya, and N. Jiang, “Problem-oriented conceptual model and ontology for enterprise e-recruitment,” in Iceis 2018 – proceedings of the 20th international conference on enterprise information systems, 2018, p. 280–289.

2017

  • P. Whittington and H. Dogan, “Smartpowerchair: characterization and usability of a pervasive system of systems,” Ieee transactions on human-machine systems, vol. 47, iss. 4, p. 500–510, 2017. 
  • D. Ki-Aries, H. Dogan, S. Faily, P. Whittington, and C. Williams, “From Requirements to Operation: Components for Risk Assessment in a Pervasive System of Systems,” in 2017 IEEE 25th International Requirements Engineering Conference Workshops (REW)-Proceedings of 4th International Workshop on Evolving Security & Privacy Requirements Engineering, 2017, p. 83–89. 
  • D. Ki-Aries and S. Faily, “Persona-Centred Information Security Awareness,” Computers & security, vol. 70, p. 663–674, 2017. 
  • D. Ki-Aries and S. Faily, “Persona-centred information security awareness,” Computers & security, vol. 70, iss. Supplement C, pp. 663-674, 2017. 
  • P. Whittington and H. Dogan, “Human factors in transportation cyber physical system,” in Transportation cyber physical system, M. Chowdhury and L. Deka, Eds., Elsevier, 2017. 
  •  H. South, M. Taylor, H. Dogan, and N. Jiang, “Digitising a medical clerking system with multimodal interaction support,” in Icmi 2017 – proceedings of the 19th acm international conference on multimodal interaction, 2017, p. 238–242. 
  •  N. Jiang, H. Dogan, and F. Tian, “Designing mobile friendly captchas: an exploratory study,” in Hci 2017: digital make believe – proceedings of the 31st international bcs human computer interaction conference, hci 2017, 2017, p. 1–7. 
  •  P. Whittington and H. Dogan, “Smartpowerchair: characterization and usability of a pervasive system of systems,” Ieee transactions on human-machine systems, vol. 47, p. 500–510, 2017. 
  •  J. Ward, H. Dogan, E. Apeh, A. Mylonas, and V. Katos, “Using human factor approaches to an organisation’s bring your own device scheme,” in Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics), 2017, p. 396–413. 
  • H. Thackray, C. Richardson, H. Dogan, J. Taylor, and J. McAlaney, “Surveying the hackers: the challenges of data collection from a secluded community,” in European conference on information warfare and security, eccws, 2017, p. 745–748. 
  • S. Ambore, E. Apeh, H. Dogan, C. Richardson, and D. Osselton, “Development of human factors and cybersecurity objectives for mobile financial service (mfs).” 2017.

2016

  • P. Whittington, “Improving user interaction through a smartdisability framework,” in Proceedings of the 30th international bcs human computer interaction conference: fusion!, 2016, p. 8. 
  • P. Whittington and H. Dogan, “A smartdisability framework: enhancing user interaction,” in Proceedings of the 30th international bcs human computer interaction conference: fusion!, 2016, p. 24. 
  • P. Whittington and H. Dogan, “Smartdisability: a smart system of systems approach to disability,” in 2016 11th system of systems engineering conference (sose), 2016, p. 1–6. 
  • D. Ki-Aries, S. Faily, and K. Beckers, “Persona-driven information security awareness,” in Proceedings of the 30th international bcs human computer interaction conference: companion volume, 2016, p. 37. 
  • S. Faily, D. Power, and I. Fléchais, “Gulfs of Expectation: Eliciting and Verifying Differences in Trust Expectations using Personas,” Journal of trust management, vol. 3, iss. 4, pp. 1-22, 2016. 
  • S. Faily, G. Lykou, A. Partridge, D. Gritzalis, A. Mylonas, and V. Katos, “Human-Centered Specification Exemplars for Critical Infrastructure Environments,” in Proceedings of the 30th British HCI Group Annual Conference on People and Computers, 2016. 
  • E. Bolat, H. Dogan, D. Biggins, M. Dupac, and E. Crowley, “Empowering university students through online multiple choice questions.” 2016, p. 4187–4193. 
  • S. Faily, N. Jiang, H. Dogan, and J. Taylor, Proceedings of the 30th international bcs human computer interaction conference (hci 2016), British Computer Society, 2016. 
  •  A. Alrobai, J. McAlaney, H. Dogan, K. Phalp, and R. Ali, “Exploring the requirements and design of persuasive intervention technology to combat digital addiction,” in Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics), 2016, p. 130–150. 
  • H. Bouchachia, H. Dogan, N. Jiang, and S. Giff, “Human-centred design for intelligent environments.” , 2016, vol. 2016-July. 
  •  S. Giff and H. Dogan, “Ux research is dead. long live ux research!,” in Proceedings of the 30th international bcs human computer interaction conference, hci 2016, 2016. 
  •  H. Thackray, J. McAlaney, H. Dogan, J. Taylor, and C. Richardson, “Social psychology: an under-used tool in cybersecurity,” in Proceedings of the 30th international bcs human computer interaction conference, hci 2016, 2016. 
  • B. Scott, H. Dogan, and N. Jiang, “Examining the effects of lighting effects on peripheral devices for visual user notifications,” in Proceedings of the 30th international bcs human computer interaction conference, hci 2016, 2016. 
  • S. Ambore, C. Richardson, H. Dogan, E. Apeh, and D. Osselton, “A “soft” approach to analysing mobile financial services socio-technical systems,” in Proceedings of the 30th international bcs human computer interaction conference, hci 2016, 2016. 
  •  P. Whittington and H. Dogan, “A smartdisability framework: enhancing user interaction,” in Proceedings of the 30th international bcs human computer interaction conference, hci 2016, 2016. 
  •  P. Whittington and H. Dogan, “Smart disability: a smart system of systems approach to disability,” in 2016 11th systems of systems engineering conference, sose 2016, 2016.

2015

  • P. Whittington and H. Dogan, “Smartpowerchair: a pervasive system of systems,” in 2015 10th system of systems engineering conference (sose), 2015, p. 244–249. 
  • P. Whittington, H. Dogan, and K. Phalp, “Evaluating the usability of an automated transport and retrieval system,” in 2015 international conference on pervasive and embedded computing and communication systems (peccs), 2015, p. 49–66. 
  • P. Whittington, H. Dogan, and K. Phalp, “Smartpowerchair: to boldly go where a powerchair has not gone before,” in In proc. proceedings of the international conference on ergonomics & human factors 2015, 2015, p. 233–240. 
  • S. Faily, “Engaging stakeholders during late stage security design with assumption personas,” Information and computer security, vol. 23, iss. 4, p. 435–446, 2015. 
  • M. Favale, N. McDonald, S. Faily, and C. Gatzidis, “Human aspects in digital rights management: the perspectives of content developers,” in Fourth international workshop on artificial intelligence and ip law, 2015. 
  • A. Vallindras and S. Faily, “The Mystery of Security Design,” in Proceedings of the 2015 British Human Computer Interaction Conference , 2015, p. 316–317. 
  • S. Faily, J. Lyle, I. Fléchais, and A. Simpson, “Usability and Security by Design: A Case Study in Research and Development,” in Proceedings of the ndss workshop on usable security, 2015. 
  • S. Faily, G. Stergiopoulos, V. Katos, and D. Gritzalis, ““Water, Water, Every Where”: Nuances for a Water Industry Critical Infrastructure Specification Exemplar,” in Proceedings of the 10th International Conference on Critical Information Infrastructures Security, 2015, p. 243–246. 
  •  H. Dogan, S. Alamro, and K. Phalp, “Forming enterprise recruitment pattern based on problem-oriented conceptual model,” Procedia computer science, vol. 64, p. 298–305, 2015. 
  •  D. Biggins, E. Crowley, E. Bolat, M. Dupac, and H. Dogan, “Enhancing university student engagement using online multiple choice questions and answers,” Open journal of social sciences, p. 71–76, 2015. 
  • D. Biggins, E. Crowley, E. Bolat, M. Dupac, and H. Dogan, “Using peerwise to improve engagement and learning..” 2015, p. 585–602. 
  • H. Norman, H. Dogan, N. Nordin, and L. Halim, “An asia-europe massive open online course for lecturer training: development of pedagogical strategies for moocs.” 2015. 
  • P. Whittington and H. Dogan, “Improving life for people with disabilities,” The ergonomist, vol. 47, p. 12–13, 2015. 
  •  N. Jiang and H. Dogan, “A gesture-based captcha design supporting mobile devices,” in Acm international conference proceeding series, 2015, p. 202–207. 
  • P. Whittington, H. Dogan, and K. Phalp, “Smartpowerchair: to boldly go where a powerchair has not gone before,” in Contemporary ergonomics and human factors 2015, 2015, p. 233–242. 
  • P. Whittington, H. Dogan, and K. Phalp, “Evaluating the usability of an automated transport and retrieval system,” in Peccs 2015 – 5th international conference on pervasive and embedded computing and communication systems, proceedings, 2015, p. 59–66. 
  • H. Norman, N. Nordin, R. Din, M. Ally, and H. Dogan, “Exploring the roles of social participation in mobile social media learning: a social network analysis,” International review of research in open and distance learning, vol. 16, p. 205–224, 2015. 
  • A. Alrobai and H. Dogan, “Digital addiction ontology for social networking systems.” , 2015, vol. 8852, p. 167–175.

2014

  • S. Faily, J. Lyle, I. Fléchais, A. Atzeni, C. Cameroni, H. Myrhaug, A. Göker, and R. Kleinfeld, “Authorisation in context: incorporating context-sensitivity into an access control framework,” in Proceedings of the 28th international bcs human computer interaction conference on hci 2014 – sand, sea and sky – holiday hci, UK, 2014, p. 189–194. 
  • S. Faily and I. Fléchais, “Eliciting and Visualising Trust Expectations using Persona Trust Characteristics and Goal Models,” in Proceedings of the 6th International Workshop on Social Software Engineering, 2014, p. 17–24. 
  • S. Faily, J. Lyle, and A. Simpson, “Security and Usability Design for Research and Development: A Case Study,” Computer journal, 2014. 
  • N. Jiang and H. Dogan, “Crowdhilite: a peer review service to support serious reading on the screen,” in Proceedings of the 28th international bcs human computer interaction conference: sand, sea and sky – holiday hci, hci 2014, 2014, p. 323–328. 
  • H. Dogan, M. Sinclair, and N. Jiang, “Human factors for systems of systems (workshop).” 2014.