- Privacy, Security, and Data Protection
- Advanced Software Engineering Methodologies
- Innovative Human-Technology Interaction
- Service-Oriented Architecture and Web Services
- Information and Cyber Security
- Access Control and Trust
- Advanced Malware Detection Techniques
- Privacy-Preserving Technologies in Data
- Usability and User Interface Design
- IoT and Edge/Fog Computing
- Software Engineering Techniques and Practices
- Mobile Crowdsensing and Crowdsourcing
- Technology Use by Older Adults
- Software Engineering Research
- Digital Mental Health Interventions
- Security and Verification in Computing
- Software System Performance and Reliability
- Digital and Cyber Forensics
- Model-Driven Software Engineering Techniques
- Context-Aware Activity Recognition Systems
- Personal Information Management and User Behavior
- Human Mobility and Location-Based Analysis
- Open Source Software Innovations
- Network Security and Intrusion Detection
- Mobile Agent-Based Network Management
The Open University
2015-2024
Software (Germany)
2019
Hong Kong Metropolitan University
2009-2014
Imperial College London
2004-2011
The Open University's My Digital Life course offers a learning infrastructure that allows complete novices to experiment with, and learn about, Internet-of-Things technologies by engaging in range of activities include collaborative collective programming real-world sensing applications. first Web extra at http://youtu.be/JUpkHqivXp4 is video presentation which Arosha Bandara, lecturer computing the University, explains how embedded, interconnected devices have grown affect our lives. second...
The Internet of Things (IoT) systems are designed and developed either as standalone applications from the ground-up or with help IoT middleware platforms. They to support different kinds scenarios, such smart homes cities. Thus far, privacy concerns have not been explicitly considered by This is partly due lack systematic methods for designing that can guide software development process in IoT. In this paper, we propose a set guidelines, by-design framework, be used assess capabilities gaps...
As the interest in using policy-based approaches for systems management grows, it is becoming increasingly important to develop methods performing analysis and refinement of policy specifications. Although this an area that researchers have devoted some attention to, none proposed solutions address issues analysing specifications combine authorisation policies; contain constraints on applicability a priori specification will both detect presence inconsistencies explain situations which...
As the interest in using policy-based approaches for systems management grows, it is becoming increasingly important to develop methods performing analysis and refinement of policy specifications. Although this an area that researchers have devoted some attention to, none proposed solutions address issue deriving implementable policies from high-level goals. A key part solution problem having ability identify operations, available on underlying system, which can achieve a given goal. This...
Background: The recent proliferation of self-tracking technologies has allowed individuals to generate significant quantities data about their lifestyle. These can be used support health interventions and monitor outcomes. However, these are often stored processed by vendors who have commercial motivations, thus, they may not treated with the sensitivity which other medical treated. As sensors apps that enable continue become more sophisticated, privacy implications severe in turn. methods...
Despite several research studies, the effective analysis of policy based systems remains a significant challenge. Policy should at least (i) be expressive (ii) take account obligations and authorizations, (iii) include dynamic system model, (iv) give useful diagnostic information. We present logic-based framework which satisfies these requirements, showing how many policy-related properties can analysed, we details prototype implementation.
Mobile privacy concerns are central to Ubicomp and yet remain poorly understood. We advocate a diversified approach, enabling the cross-interpretation of data from complementary methods. However, mobility imposes number limitations on methods that can be effectively employed. discuss how we addressed this problem in an empirical study mobile social networking. report how, by combining variation experience sampling contextual interviews, have started focusing notion context relation privacy,...
How can we best explore the range of users' reactions when developing future technologies that may be controversial, such as personal healthcare systems? Our approach -- ContraVision uses futuristic videos, or other narrative forms, convey either negative positive aspects proposed technology for same scenarios. We conducted a user study to investigate what responses different versions elicited. findings show use two systematically comparable representations elicit wider spectrum than single...
As mobile computing applications have become commonplace, it is increasingly important for them to address end-users' privacy requirements. Privacy requirements depend on a number of contextual socio-cultural factors which mobility adds another level variation. However, traditional elicitation methods do not sufficiently account and therefore cannot be used effectively represent analyse the end users. On other hand, that investigate tend produce data does lend itself process extraction. To...
In this research, we explored the efficacy of various warning label designs for AI-generated content on social media platforms—e.g., deepfakes. We devised and assessed ten distinct design samples that varied across dimensions sentiment, color/iconography, positioning, level detail. Our experimental study involved 911 participants randomly assigned to these a control group evaluating content. their perceptions relating 1) Belief in being AI-generated, 2) Trust labels 3) Social Media...
In this research, we explored the efficacy of various warning label designs for AI-generated content on social media platforms—e.g., deepfakes. We devised and assessed ten distinct design samples that varied across dimensions sentiment, color/iconography, positioning, level detail. Our experimental study involved 911 participants randomly assigned to these a control group evaluating content. their perceptions relating 1) Belief in being AI-generated, 2) Trust labels 3) Social Media...
Software applications that are very large-scale, can encompass hundreds of complex user interfaces (UIs). Such commonly sold as feature-bloated off-the-shelf products to be used by people with variable needs in the required features and layout preferences. Although many UI adaptation approaches were proposed, several gaps limitations including: extensibility integration legacy systems, still need addressed state-of-the-art adaptive development systems. This paper presents Role-Based...
Abstract The Internet of Things is expected to generate large amounts heterogeneous data from diverse sources including physical sensors, user devices and social media platforms. Over the last few years, significant attention has been focused on personal data, particularly generated by smart wearable home devices. Making available for access trade become a part data‐driven digital economy. In this position paper, we review research challenges in building Databoxes that hold enable other...
As software-intensive digital systems become an integral part of modern life, ensuring that these are developed to satisfy security and privacy requirements is increasingly important societal concern. This paper examines how secure coding practice supported on Stack Overflow. Although there indications on-line environments not robust or accurate sources information, they used by large numbers developers. Findings demonstrate developers use conversation within the site actively connect with...
Abstract Privacy is a psychological topic suffering from historical neglect—a neglect that increasingly consequential in an era of social media connectedness, mass surveillance, and the permanence our electronic footprint. Despite fundamental changes privacy landscape, personality psychology journals remain largely unrepresented debates on future privacy. By contrast, disciplines like computer science communication studies, engaging directly with sociotechnical developments, interest has...
Effective privacy management requires that mobile systems" users be able to make informed decisions as their experience and knowledge of a system progresses.Prior work has shown making such is difficult task for because systems do not provide support awareness, visibility accountability when sharing privacy-sensitive information.This paper reports results our investigation into the efficacy realtime feedback mechanism incorporating these features social translucence in location-sharing...
The pressure on software developers to produce secure has never been greater. But what does security look like in environments that do not security-critical software? In answer this question, multi-sited ethnographic study characterizes episodes and identifies five typical behaviors development. Using theory drawn from information motivation research engineering, article key ways which individual form responses meet the demands of particular circumstances, providing a framework managers...
Policy-based management provides the ability to (re-) configure differentiated services networks so that desired quality of service (QoS) goals are achieved. Relevant configuration involves implementing network provisioning decisions, performing admission control, and adapting bandwidth allocation dynamically according emerging traffic demands. A policy-based approach facilitates flexibility adaptability in policies can be changed without changing implementation. However, as with any other...
Policy-based management provides the ability to (re-)configure differentiated services networks so that desired Quality of Service (QoS) goals are achieved. This requires implementing network provisioning decisions, performing admission control, and adapting bandwidth allocation emerging traffic demands. A policy-based approach facilitates flexibility adaptability as policies can be dynamically changed without modifying underlying implementation. However, inconsistencies may arise in policy...
Firewalls remain the main perimeter security protection for corporate networks. However, network size and complexity make firewall configuration maintenance notoriously difficult. Tools are needed to analyse configurations errors, verify that they correctly implement requirements generate from higher-level requirements. In this paper we extend our previous work on use of formal argumentation preference reasoning policy analysis develop means automatically policies This permits both...