[go: up one dir, main page]

Follow
Ivan Flechais
Ivan Flechais
Verified email at cs.ox.ac.uk - Homepage
Title
Cited by
Cited by
Year
Usable security: Why do we need it? How do we get it?
MA Sasse, I Flechais
O'Reilly, 2005
2692005
Security and usability: Analysis and evaluation
R Kainda, I Flechais, AW Roscoe
2010 international conference on availability, reliability and security, 275-282, 2010
2412010
Persona cases: a technique for grounding personas
S Faily, I Flechais
Proceedings of the SIGCHI conference on human factors in computing systems …, 2011
1852011
Digital deception: Generative artificial intelligence in social engineering and phishing
M Schmitt, I Flechais
Artificial Intelligence Review 57 (12), 324, 2024
1832024
Usability and security of out-of-band channels in secure device pairing protocols
R Kainda, I Flechais, AW Roscoe
Proceedings of the 5th Symposium on Usable Privacy and Security, 1-12, 2009
1772009
Bringing security home: a process for developing secure and usable systems
I Flechais, MA Sasse, SMV Hailes
Proceedings of the 2003 workshop on New security paradigms, 49-57, 2003
1612003
Integrating security and usability into the requirements and design process
I Flechais, C Mascolo, MA Sasse
International Journal of Electronic Security and Digital Forensics 1 (1), 12-26, 2007
1482007
“It did not give me an option to decline”: A Longitudinal Analysis of the User Experience of Security and Privacy in Smart Home Products
G Chalhoub, MJ Kraemer, N Nthala, I Flechais
Proceedings of the 2021 CHI conference on human factors in computing systems …, 2021
1072021
Authentication protocols based on low-bandwidth unspoofable channels: a comparative survey
LH Nguyen, AW Roscoe
Journal of Computer Security 19 (1), 139-201, 2011
1052011
Designing secure and usable systems
I Fléchais
912005
Divide and conquer: the role of trust and assurance in the design of secure socio-technical systems
I Flechais, J Riegelsberger, MA Sasse
Proceedings of the 2005 workshop on New security paradigms, 33-41, 2005
862005
Maintainability prediction: A regression analysis of measures of evolving systems
JH Hayes, L Zhao
21st IEEE International Conference on Software Maintenance (ICSM'05), 601-604, 2005
702005
Barry is not the weakest link: Eliciting Secure System Requirements with Personas
S Faily, I Fléchais
632010
Stakeholder involvement, motivation, responsibility, communication: How to design usable security in e-Science
I Flechais, MA Sasse
International Journal of Human-Computer Studies 67 (4), 281-296, 2009
622009
Informal support networks: an investigation into home data security practices
N Nthala, I Flechais
Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018), 63-82, 2018
612018
Here's Johnny: a methodology for developing attacker personas
A Atzeni, C Cameroni, S Faily, J Lyle, I Fléchais
2011 Sixth International Conference on Availability, Reliability and …, 2011
592011
“Alexa, are you spying on me?”: Exploring the Effect of User Experience on the Security and Privacy of Smart Speaker Users
G Chalhoub, I Flechais
International conference on human-computer interaction, 305-325, 2020
582020
Security practices for households bank customers in the Kingdom of Saudi Arabia
D Alghamdi, I Flechais, M Jirotka
Eleventh Symposium On Usable Privacy and Security ({SOUPS} 2015), 297-308, 2015
572015
A meta-model for usable secure requirements engineering
S Faily, I Fléchais
Proceedings of the 2010 ICSE Workshop on Software Engineering for Secure …, 2010
542010
The secret lives of assumptions: Developing and refining assumption personas for secure system design
S Faily, I Fléchais
International Conference on Human-Centred Software Engineering, 111-118, 2010
492010
The system can't perform the operation now. Try again later.
Articles 1–20