Follow
Inah Omoronyia
Title
Cited by
Year
Moving beyond cyber security awareness and training to engendering security knowledge sharing
S Alahmari, K Renaud, I Omoronyia
Information Systems and e-Business Management 21 (1), 123-158, 2023
122023
DCMS consultation: Security and Privacy settings in Apps and App Stores
M CARR, I Castro, A Rashid, J Llanos, O Michalec, M Ramopakane, ...
REPHRAIN: National Research Centre on Privacy, Harm Reduction and …, 2022
2022
Analysing Privacy Conflicts in Web-Based Systems
P Inglis, I Omoronyia
2021 IEEE 29th International Requirements Engineering Conference (RE), 430-431, 2021
2021
Implement a model for describing and maximising security knowledge sharing
S Alahmari, K Renaud, I Omoronyia
2020 15th International Conference for Internet Technology and Secured …, 2020
32020
Towards using unstructured user input request for malware detection
O Olukoya, L Mackenzie, I Omoronyia
Computers & Security 93, 101783, 2020
122020
Security-oriented view of app behaviour using textual descriptions and user-granted permission requests
O Olukoya, L Mackenzie, I Omoronyia
Computers & Security 89, 101685, 2020
252020
A model for describing and maximising security knowledge sharing to enhance security awareness
S Alahmari, K Renaud, I Omoronyia
Information Systems: 16th European, Mediterranean, and Middle Eastern …, 2020
52020
A privacy awareness system for software design
I Omoronyia, U Etuk, P Inglis
International Journal of Software Engineering and Knowledge Engineering 29 …, 2019
92019
Why is Baking Privacy into Software Design Hard?
I Omoronyia
ITNOW 61 (3), 44-45, 2019
42019
The case for privacy awareness requirements
I Omoronyia
Censorship, Surveillance, and Privacy: Concepts, Methodologies, Tools, and …, 2019
62019
A Systematic Review of Information Security Knowledge-Sharing Research.
S Al-Ahmari, K Renaud, I Omoronyia
HAISA, 101-110, 2018
72018
Permission-based risk signals for app behaviour characterization in Android apps
O Olukoya, L Mackenzie, I Omoronyia
42018
Privacy engineering in dynamic settings
I Omoronyia
2017 IEEE/ACM 39th International Conference on Software Engineering …, 2017
32017
Reasoning with imprecise privacy preferences
I Omoronyia
Proceedings of the 2016 24th ACM SIGSOFT International Symposium on …, 2016
92016
Systems and methods for runtime adaptive security to protect variable assets
M Salehie, L Pasquale, C Menghi, I Omoronyia, B Nuseibeh
US Patent 9,330,262, 2016
182016
Engineering adaptive privacy: on the role of privacy awareness requirements
I Omoronyia, L Cavallaro, M Salehie, L Pasquale, B Nuseibeh
2013 35th International Conference on Software Engineering (ICSE), 632-641, 2013
852013
Using ontologies and machine learning for hazard identification and safety analysis
O Daramola, T Stålhane, I Omoronyia, G Sindre
Managing requirements knowledge, 117-141, 2013
322013
Social adaptation at runtime
R Ali, C Solis, I Omoronyia, M Salehie, B Nuseibeh
Evaluation of Novel Approaches to Software Engineering: 7th International …, 2013
62013
SecuriTAS: a tool for engineering adaptive security
L Pasquale, C Menghi, M Salehie, L Cavallaro, I Omoronyia, B Nuseibeh
Proceedings of the ACM SIGSOFT 20th International Symposium on the …, 2012
332012
Privacy arguments: Analysing selective disclosure requirements for mobile applications
TT Tun, AK Bandara, BA Price, Y Yu, C Haley, I Omoronyia, B Nuseibeh
2012 20th IEEE International Requirements Engineering Conference (RE), 131-140, 2012
262012
The system can't perform the operation now. Try again later.
Articles 1–20