| Persona cases: a technique for grounding personas S Faily, I Flechais Proceedings of the 2011 annual conference on Human factors in computing …, 2011 | 185 | 2011 |
| Persona-centred information security awareness D Ki-Aries, S Faily Computers & security 70, 663-674, 2017 | 167 | 2017 |
| Exploring the gap between the student expectations and the reality of teamwork in undergraduate software engineering group projects C Iacob, S Faily Journal of systems and software 157, 110393, 2019 | 64 | 2019 |
| Barry is not the weakest link: Eliciting Secure System Requirements with Personas S Faily, I Fléchais Proceedings of the 24th BCS Interaction Specialist Group Conference, 124-132, 2010 | 63 | 2010 |
| Online reviews as first class artifacts in mobile app development C Iacob, R Harrison, S Faily International Conference on Mobile Computing, Applications, and Services, 47-53, 2013 | 62 | 2013 |
| Here's Johnny: A Methodology for Developing Attacker Personas A Atzeni, C Cameroni, S Faily, J Lyle, I Flechais Availability, Reliability and Security (ARES), 2011 Sixth International …, 2011 | 59 | 2011 |
| A meta-model for usable secure requirements engineering S Faily, I Fléchais Proceedings of the 2010 ICSE Workshop on Software Engineering for Secure …, 2010 | 54 | 2010 |
| The secret lives of assumptions: Developing and refining assumption personas for secure system design S Faily, I Fléchais Human-Centred Software Engineering, 111-118, 2010 | 49 | 2010 |
| Evaluating privacy-determining user privacy expectations on the web C Pilton, S Faily, J Henriksen-Bulmer computers & security 105, 102241, 2021 | 45 | 2021 |
| The webinos Project C Fuhrhop, J Lyle, S Faily | 43* | |
| Towards tool-support for usable secure requirements engineering with CAIRIS S Faily, I Flechais International Journal of Secure Software Engineering (IJSSE) 1 (3), 56-70, 2010 | 38 | 2010 |
| Guidelines for integrating personas into software engineering tools S Faily, J Lyle Proceedings of the 5th ACM SIGCHI symposium on Engineering interactive …, 2013 | 37 | 2013 |
| Designing usable and secure software with IRIS and CAIRIS S Faily Springer International Publishing, 2018 | 36 | 2018 |
| The impact of undergraduate mentorship on student satisfaction and engagement, teamwork performance, and team dysfunction in a software engineering group project C Iacob, S Faily Proceedings of the 51st ACM Technical Symposium on Computer Science …, 2020 | 32 | 2020 |
| Tool-supporting data protection impact assessments with CAIRIS J Coles, S Faily, D Ki-Aries 2018 IEEE 5th International Workshop on Evolving Security & Privacy …, 2018 | 30 | 2018 |
| Cross-platform access control for mobile web applications J Lyle, S Monteleone, S Faily, D Patti, F Ricciato 2012 IEEE International Symposium on Policies for Distributed Systems and …, 2012 | 30 | 2012 |
| A framework of usable and secure system design S Faily Oxford University, UK, 2011 | 30 | 2011 |
| The social psychology of cybersecurity J McAlaney, J Taylor, S Faily Psychologist 29 (9), 686-689, 2016 | 29 | 2016 |
| Usability and security by design: a case study in research and development S Faily, J Lyle, I Fléchais, A Simpson Internet Society, 2015 | 28 | 2015 |
| Requirements sensemaking using concept maps S Faily, J Lyle, A Paul, A Atzeni, D Blomme, H Desruelle, K Bangalore International conference on human-centred software engineering, 217-232, 2012 | 26 | 2012 |