default search action
Ivan Flechais
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2005
- [b1]Ivan Flechais:
The development of secure and usable systems. University College London, UK, 2005
Journal Articles
- 2024
- [j12]Marc Schmitt, Ivan Flechais:
Digital deception: generative artificial intelligence in social engineering and phishing. Artif. Intell. Rev. 57(12): 324 (2024) - [j11]Selina Cho, Jonathan Lusthaus, Ivan Flechais:
Unpacking the Dynamics of Harm in Game Cheating Communities: A Guiding Framework for Cross-Industry Intervention. Games Res. Pract. 2(2): 12:1-12:17 (2024) - [j10]George Chalhoub, Martin J. Kraemer, Ivan Flechais:
Useful shortcuts: Using design heuristics for consent and permission in smart home devices. Int. J. Hum. Comput. Stud. 182: 103177 (2024) - [j9]Wael S. Albayaydh, Ivan Flechais:
"Innovative Technologies or Invasive Technologies?": Exploring Design Challenges of Privacy Protection With Smart Home in Jordan. Proc. ACM Hum. Comput. Interact. 8(CSCW1): 1-54 (2024) - 2023
- [j8]Martin J. Kraemer, George Chalhoub, Helena Webb, Ivan Flechais:
"It becomes more of an abstract idea, this privacy" - Informing the design for communal privacy experiences in smart homes. Int. J. Hum. Comput. Stud. 180: 103138 (2023) - 2022
- [j7]George Chalhoub, Ivan Flechais:
Data Protection at a Discount: Investigating the UX of Data Protection from User, Designer, and Business Leader Perspectives. Proc. ACM Hum. Comput. Interact. 6(CSCW2): 1-36 (2022) - 2016
- [j6]Shamal Faily, Ivan Flechais:
Finding and resolving security misusability with misusability cases. Requir. Eng. 21(2): 209-223 (2016) - 2011
- [j5]Shamal Faily, Ivan Flechais:
Eliciting Policy Requirements for Critical National Infrastructure Using the IRIS Framework. Int. J. Secur. Softw. Eng. 2(4): 1-18 (2011) - 2010
- [j4]Shamal Faily, Ivan Flechais:
Towards Tool-Support for Usable Secure Requirements Engineering with CAIRIS. Int. J. Secur. Softw. Eng. 1(3): 56-70 (2010) - [j3]Shamal Faily, Ivan Flechais:
Designing and Aligning e-Science Security Culture with Design. Inf. Manag. Comput. Secur. 18(5): 339-349 (2010) - 2009
- [j2]Ivan Flechais, Martina Angela Sasse:
Stakeholder involvement, motivation, responsibility, communication: How to design usable security in e-Science. Int. J. Hum. Comput. Stud. 67(4): 281-296 (2009) - 2007
- [j1]Ivan Flechais, Cecilia Mascolo, Martina Angela Sasse:
Integrating security and usability into the requirements and design process. Int. J. Electron. Secur. Digit. Forensics 1(1): 12-26 (2007)
Conference and Workshop Papers
- 2024
- [c40]Sarah A. Alromaih, Ivan Flechais, George Chalhoub:
Beyond the Office Walls: Understanding Security and Shadow Security Behaviours in a Remote Work Context. SOUPS @ USENIX Security Symposium 2024: 507-525 - [c39]Wael S. Albayaydh, Ivan Flechais:
Co-Designing a Mobile App for Bystander Privacy Protection in Jordanian Smart Homes: A Step Towards Addressing a Complex Privacy Landscape. USENIX Security Symposium 2024 - 2023
- [c38]Selina Cho, Jonathan Lusthaus, Ivan Flechais:
The Slippery Slope: Exploring the Parallels Between Game Cheating and Cybercrime Through Routine Activity Theory. eCrime 2023: 1-13 - [c37]Ivan Flechais, George Chalhoub:
Practical Cybersecurity Ethics: Mapping CyBOK to Ethical Concerns. NSPW 2023: 62-75 - [c36]Wael S. Albayaydh, Ivan Flechais:
Examining Power Dynamics and User Privacy in Smart Technology Use Among Jordanian Households. USENIX Security Symposium 2023: 4643-4659 - 2022
- [c35]Wael S. Albayaydh, Ivan Flechais:
Exploring Bystanders' Privacy Concerns with Smart Homes in Jordan. CHI 2022: 446:1-446:24 - 2021
- [c34]George Chalhoub, Martin J. Kraemer, Norbert Nthala, Ivan Flechais:
"It did not give me an option to decline": A Longitudinal Analysis of the User Experience of Security and Privacy in Smart Home Products. CHI 2021: 555:1-555:16 - 2020
- [c33]George Chalhoub, Ivan Flechais, Norbert Nthala, Ruba Abu-Salma, Elie Tom:
Factoring User Experience into the Security and Privacy Design of Smart Home Devices: A Case Study. CHI Extended Abstracts 2020: 1-9 - [c32]Martin J. Kraemer, Ulrik Lyngs, Helena Webb, Ivan Flechais:
Further Exploring Communal Technology Use in Smart Homes: Social Expectations. CHI Extended Abstracts 2020: 1-7 - [c31]Anjuli R. K. Shere, Jason R. C. Nurse, Ivan Flechais:
"Security should be there by default": Investigating how journalists perceive and respond to risks from the Internet of Things. EuroS&P Workshops 2020: 240-249 - [c30]George Chalhoub, Ivan Flechais:
"Alexa, Are You Spying on Me?": Exploring the Effect of User Experience on the Security and Privacy of Smart Speaker Users. HCI (30) 2020: 305-325 - [c29]George Chalhoub, Ivan Flechais, Norbert Nthala, Ruba Abu-Salma:
Innovation Inaction or In Action? The Role of User Experience in the Security and Privacy Design of Smart Home Cameras. SOUPS @ USENIX Security Symposium 2020: 185-204 - 2019
- [c28]Martin J. Kraemer, Ivan Flechais, Helena Webb:
Exploring Communal Technology Use in the Home. HTTF 2019: 5:1-5:8 - 2018
- [c27]Norbert Nthala, Ivan Flechais:
Informal Support Networks: an investigation into Home Data Security Practices. SOUPS @ USENIX Security Symposium 2018: 63-82 - 2017
- [c26]Norbert Nthala, Ivan Flechais:
"If It's Urgent or It Is Stopping Me from Doing Something, Then I Might Just Go Straight at It": A Study into Home Data Security Decisions. HCI (22) 2017: 123-142 - 2015
- [c25]Andrew C. Simpson, Andrew P. Martin, Cas Cremers, Ivan Flechais, Ivan Martinovic, Kasper Bonne Rasmussen:
Experiences in Developing and Delivering a Programme of Part-Time Education in Software and Systems Security. ICSE (2) 2015: 435-444 - [c24]Deena Alghamdi, Ivan Flechais, Marina Jirotka:
Security Practices for Households Bank Customers in the Kingdom of Saudi Arabia. SOUPS 2015: 297-308 - 2014
- [c23]Shamal Faily, John Lyle, Ivan Flechais, Andrea S. Atzeni, Cesare Cameroni, Hans I. Myrhaug, Ayse Göker, Robert Kleinfeld:
Authorisation in Context: Incorporating Context-Sensitivity into an Access Control Framework. BCS HCI 2014 - [c22]Shamal Faily, Ivan Flechais:
Eliciting and visualising trust expectations using persona trust characteristics and goal models. SSE@SIGSOFT FSE 2014: 17-24 - 2013
- [c21]Ivan Flechais, Marina Jirotka, Deena Alghamdi:
In the balance in Saudi Arabia: security, privacy and trust. CHI Extended Abstracts 2013: 823-828 - [c20]Shamal Faily, David Power, Philip Armstrong, Ivan Flechais:
Formal Evaluation of Persona Trustworthiness with EUSTACE - (Extended Abstract). TRUST 2013: 267-268 - 2012
- [c19]John Lyle, Shamal Faily, Ivan Flechais, André Paul, Ayse Göker, Hans I. Myrhaug, Heiko Desruelle, Andrew P. Martin:
On the Design and Development of webinos: A Distributed Mobile Application Middleware. DAIS 2012: 140-147 - [c18]John Lyle, Andrew J. Paverd, Justin King-Lacroix, Andrea S. Atzeni, Habib Virji, Ivan Flechais, Shamal Faily:
Personal PKI for the Smart Device Era. EuroPKI 2012: 69-84 - 2011
- [c17]Shamal Faily, Ivan Flechais:
User-Centered Information Security Policy Development in a Post-Stuxnet World. ARES 2011: 716-721 - [c16]Andrea S. Atzeni, Cesare Cameroni, Shamal Faily, John Lyle, Ivan Flechais:
Here's Johnny: A Methodology for Developing Attacker Personas. ARES 2011: 722-727 - [c15]Shamal Faily, Ivan Flechais:
Persona cases: a technique for grounding personas. CHI 2011: 2267-2270 - [c14]Shamal Faily, Ivan Flechais:
Eliciting usable security requirements with misusability cases. RE 2011: 339-340 - 2010
- [c13]Ronald Kainda, Ivan Flechais, A. W. Roscoe:
Security and Usability: Analysis and Evaluation. ARES 2010: 275-282 - [c12]Shamal Faily, Ivan Flechais:
Analysing and Visualising Security and Usability in IRIS. ARES 2010: 543-548 - [c11]Shamal Faily, Ivan Flechais:
Barry is not the weakest link: eliciting secure system requirements with personas. BCS HCI 2010: 124-132 - [c10]Shamal Faily, Ivan Flechais:
A Model of Security Culture for e-Science. SAISMC 2010: 154-164 - [c9]Shamal Faily, Ivan Flechais:
The Secret Lives of Assumptions: Developing and Refining Assumption Personas for Secure System Design. HCSE 2010: 111-118 - [c8]Shamal Faily, Ivan Flechais:
A meta-model for usable secure requirements engineering. SESS@ICSE 2010: 29-35 - [c7]Shamal Faily, Ivan Flechais:
To boldly go where invention isn't secure: applying security entrepreneurship to secure systems design. NSPW 2010: 73-84 - [c6]Ronald Kainda, Ivan Flechais, A. W. Roscoe:
Two heads are better than one: security and usability of device associations in group scenarios. SOUPS 2010 - [c5]Ronald Kainda, Ivan Flechais, A. W. Roscoe:
Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactions. WISTP 2010: 308-315 - 2009
- [c4]Shamal Faily, Ivan Flechais:
Context-Sensitive Requirements and Risk Management with IRIS. RE 2009: 379-380 - [c3]Ronald Kainda, Ivan Flechais, A. W. Roscoe:
Usability and security of out-of-band channels in secure device pairing protocols. SOUPS 2009 - 2005
- [c2]Ivan Flechais, Jens Riegelsberger, Martina Angela Sasse:
Divide and conquer: the role of trust and assurance in the design of secure socio-technical systems. NSPW 2005: 33-41 - 2003
- [c1]Ivan Flechais, Martina Angela Sasse, Stephen Hailes:
Bringing security home: a process for developing secure and usable systems. NSPW 2003: 49-57
Editorship
- 2013
- [e1]Michael Huth, N. Asokan, Srdjan Capkun, Ivan Flechais, Lizzie Coles-Kemp:
Trust and Trustworthy Computing - 6th International Conference, TRUST 2013, London, UK, June 17-19, 2013. Proceedings. Lecture Notes in Computer Science 7904, Springer 2013, ISBN 978-3-642-38907-8 [contents]
Informal and Other Publications
- 2023
- [i5]Marc Schmitt, Ivan Flechais:
Digital Deception: Generative Artificial Intelligence in Social Engineering and Phishing. CoRR abs/2310.13715 (2023) - [i4]Ivan Flechais, George Chalhoub:
Practical Cybersecurity Ethics: Mapping CyBOK to Ethical Concerns. CoRR abs/2311.10165 (2023) - 2020
- [i3]Martin J. Kraemer, Ulrik Lyngs, Helena Webb, Ivan Flechais:
Further Exploring Communal Technology Use in Smart Homes: Social Expectations. CoRR abs/2003.04661 (2020) - [i2]Anjuli R. K. Shere, Jason R. C. Nurse, Ivan Flechais:
Security should be there by default: Investigating how journalists perceive and respond to risks from the Internet of Things. CoRR abs/2008.04698 (2020) - 2019
- [i1]Martin J. Kraemer, William Seymour, Reuben Binns, Max Van Kleek, Ivan Flechais:
Informing The Future of Data Protection in Smart Homes. CoRR abs/1910.01973 (2019)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-22 20:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint