Joseph Hallett
Joseph Hallett
Verified email at
Cited by
Cited by
Usability Smells: An Analysis of {Developers’} Struggle With Crypto Libraries
N Patnaik, J Hallett, A Rashid
Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019), 245-257, 2019
Bringing cyber to school: Integrating cybersecurity into secondary school education
D Pencheva, J Hallett, A Rashid
IEEE Security & Privacy 18 (2), 68-74, 2020
Mirror, mirror, on the wall: What are we teaching them all? Characterising the focus of cybersecurity curricular frameworks
J Hallett, R Larson, A Rashid
2018 USENIX Workshop on Advances in Security Education (ASE 18), 2018
The impact of surface features on choice of (in) secure answers by Stackoverflow readers
D Van Der Linden, E Williams, J Hallett, A Rashid
IEEE Transactions on Software Engineering 48 (2), 364-376, 2020
“Do this! Do that!, And nothing will happen” Do specifications lead to securely stored passwords?
J Hallett, N Patnaik, B Shreeve, A Rashid
2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE …, 2021
The best laid plans or lack thereof: Security decision-making of different stakeholder groups
B Shreeve, J Hallett, M Edwards, KM Ramokapane, R Atkins, A Rashid
IEEE Transactions on Software Engineering, 2020
“So If Mr Blue Head Here Clicks the Link...” Risk Thinking in Cyber Security Decision Making
B Shreeve, J Hallett, M Edwards, P Anthonysamy, S Frey, A Rashid
ACM Transactions on Privacy and Security (TOPS) 24 (1), 1-29, 2020
Developers are neither enemies nor users: they are collaborators
PD Chowdhury, J Hallett, N Patnaik, M Tahaei, A Rashid
2021 IEEE Secure Development Conference (SecDev), 47-55, 2021
Towards an Authorization Framework for App Security Checking.
J Hallett, D Aspinall
ESSoS Doctoral Symposium, 2014
The United Kingdom’s cyber security degree certification program: a cyber security body of knowledge case study
L Nautiyal, A Rashid, J Hallett, B Shreeve, K Michael, E Chris, ...
IEEE Security & Privacy 20 (1), 87-95, 2022
AppPAL for Android: Capturing and Checking Mobile App Policies
J Hallett, D Aspinall
Engineering Secure Software and Systems: 8th International Symposium, ESSoS …, 2016
SLR: From Saltzer and Schroeder to 2021… 47 Years of Research on the Development and Validation of Security API Recommendations
N Patnaik, A Dwyer, J Hallett, A Rashid
ACM Transactions on Software Engineering and Methodology 32 (3), 1-31, 2023
If you build it, will they come? Developer recruitment for security studies
N Patnaik, J Hallett, M Tahaei, A Rashid
Recruitment of Participants for Empirical SE Studies (RoPES), 2022
Capturing Policies for BYOD
J Hallett, D Aspinall
ICT Systems Security and Privacy Protection: 32nd IFIP TC 11 International …, 2017
How darknet market users learned to worry more and love PGP: Analysis of security advice on darknet marketplaces
AC Dwyer, J Hallett, C Peersman, M Edwards, BI Davidson, A Rashid
arXiv preprint arXiv:2203.08557, 2022
Don't forget your classics: Systematizing 45 years of Ancestry for Security API Usability Recommendations
N Patnaik, AC Dwyer, J Hallett, A Rashid
arXiv preprint arXiv:2105.02031, 2021
The UK’s Cyber Security Degree Certification Programme: A CyBOK Case Study
L Nautiyal, A Rashid, J Hallett, B Shreeve
Technical Report, 2020
Common Concerns in BYOD Policies
J Hallett, D Aspinall
Workshop on Innovations in Mobile Privacy and Security, 2017
Decisions & Disruptions 2: Decide Harder
B Shreeve, J Gardiner, J Hallett, D Humphries, A Rashid
arXiv preprint arXiv:2306.12168, 2023
Decisions & Disruptions 2: Decide Harder: A custom cyber security incident response exercise
J Hallett, A Rashid, B Shreeve, J Gardiner, D Humphries
Workshop on Deconstructing Gamified Approaches to Security and Privacy, 2023
The system can't perform the operation now. Try again later.
Articles 1–20