Publication statistics

Pub. period:1995-2011
Pub. count:36
Number of co-authors:43



Co-authors

Number of publications with 3 favourite co-authors:

Blaine A. Price:7
Robin C. Laney:7
Michael Jackson:6

 

 

Productive colleagues

Bashar Nuseibeh's 3 most productive colleagues in number of publications:

Yvonne Rogers:99
Steve M. Easterbro..:24
Adam N. Joinson:20
 
 
 
Jul 14

If you do good work for good clients, it will lead to other good work for other good clients. If you do bad work for bad clients, it will lead to other bad work for other bad clients

-- Michael Bierut

 
 

Featured chapter

Marc Hassenzahl explains the fascinating concept of User Experience and Experience Design. Commentaries by Don Norman, Eric Reiss, Mark Blythe, and Whitney Hess

User Experience and Experience Design !

 
 

Our Latest Books

Kumar and Herger 2013: Gamification at Work: Designing Engaging Business Software...
by Janaki Mythily Kumar and Mario Herger

 
Start reading

Whitworth and Ahmad 2013: The Social Design of Technical Systems: Building technologies for communities...
by Brian Whitworth and Adnan Ahmad

 
Start reading

Soegaard and Dam 2013: The Encyclopedia of Human-Computer Interaction, 2nd Ed....
by Mads Soegaard and Rikke Friis Dam

 
Start reading
 
 

Help us help you!

 
 

Bashar Nuseibeh

Picture of Bashar Nuseibeh.
Personal Homepage:
http://mcs.open.ac.uk/ban25/

I am a Professor of Computing at The Open University (Director of Research, 2002-2008), and a Professor of Software Engineering and Chief Scientist at Lero - the Irish Software Engineering Research Centre. Previously, I was a Reader in the Department of Computing at Imperial College London and Head of its Software Engineering Laboratory. I continue my association with Imperial College as a Visiting Professor, and maintain strong research links with the Distributed Software Engineering Group. I am also a Visiting Professor at the National Institute of Informatics, Japan.

Edit author info
Add publication

Publications by Bashar Nuseibeh (bibliography)

 what's this?
2011
 
Edit | Del

Mancini, Clara, Rogers, Yvonne, Thomas, Keerthi, Joinson, Adam N., Price, Blaine A., Bandara, Arosha K., Jedrzejczyk, Lukasz and Nuseibeh, Bashar (2011): In the best families: tracking and relationships. In: Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems 2011. pp. 2419-2428.

A growing body of research has been exploring the use of control mechanisms to address the privacy concerns raised by location-tracking technology. We report on a qualitative study of two family groups who used a custom-built tracking application for an extended period of time. Akin to sociological breaching experiments, the study focuses on the interferences between location tracking and relationship management. We analyze the tensions that can arise between affordances of the technology and uses that the contracts between family members legitimize. We describe how, by fostering misperceptions and 'nudging' behaviors, location-tracking technology can generate anxieties and conflicts even in close relationships. We discuss their vulnerability to the overreaching effects of tracking, against which the use of mechanisms such as location-sharing preferences and feedback may not be socially viable.

© All rights reserved Mancini et al. and/or their publisher

2010
 
Edit | Del

Jedrzejczyk, Lukasz, Price, Blaine A., Bandara, Arosha and Nuseibeh, Bashar (2010): "Privacy-shake",: a haptic interface for managing privacy settings in mobile location sharing applications. In: Proceedings of 12th Conference on Human-computer interaction with mobile devices and services 2010. pp. 411-412.

We describe the "Privacy-Shake", a novel interface for managing coarse grained privacy settings. We built a prototype that enables users of Buddy Tracker, an example location sharing application, to change their privacy preferences by shaking their phone. Users can enable or disable location sharing and change the level of granularity of disclosed location by shaking and sweeping their phone. In this poster we present and motivate our work on Privacy-Shake and report on a lab-based evaluation of the interface with 16 participants.

© All rights reserved Jedrzejczyk et al. and/or their publisher

 
Edit | Del

Jedrzejczyk, Lukasz, Price, Blaine A., Bandara, Arosha K. and Nuseibeh, Bashar (2010): On the impact of real-time feedback on users' behaviour in mobile location-sharing applications. In: Proceedings of the 2010 Symposium on Usable Privacy and Security 2010. p. 14.

Effective privacy management requires that mobile systems' users be able to make informed privacy decisions as their experience and knowledge of a system progresses. Prior work has shown that making such privacy decisions is a difficult task for users because systems do not provide support for awareness, visibility and accountability when sharing privacy-sensitive information. This paper reports results of our investigation into the efficacy of realtime feedback as a mechanism for incorporating these features of social translucence in location-sharing applications, in order to help users make better privacy decisions. We explored the role of real-time feedback in the context of Buddy Tracker, a mobile location-sharing application. Our work focuses on ways in which real-time feedback affects people's behaviour in order to identify the main criteria for acceptance of this technology. Based on the data from a three week field trial of Buddy Tracker, a focus group session, and interviews, we found that when using a system that provided real-time feedback, people were more accountable for their actions and reduced the number of unreasonable location requests. We have used the results of our study to propose high-level design criteria for incorporating real-time feedback into information sharing applications in a manner that ensures social acceptance of the technology.

© All rights reserved Jedrzejczyk et al. and/or their publisher

 
Edit | Del

Mancini, Clara, Rogers, Yvonne, Bandara, Arosha K., Coe, Tony, Jedrzejczyk, Lukasz, Joinson, Adam N., Price, Blaine A., Thomas, Keerthi and Nuseibeh, Bashar (2010): Contravision: exploring users' reactions to futuristic technology. In: Proceedings of ACM CHI 2010 Conference on Human Factors in Computing Systems 2010. pp. 153-162.

How can we best explore the range of users' reactions when developing future technologies that may be controversial, such as personal healthcare systems? Our approach -- ContraVision -- uses futuristic videos, or other narrative forms, that convey either negative or positive aspects of the proposed technology for the same scenarios. We conducted a user study to investigate what range of responses the different versions elicited. Our findings show that the use of two systematically comparable representations of the same technology can elicit a wider spectrum of reactions than a single representation can. We discuss why this is so and the value of obtaining breadth in user feedback for potentially controversial technologies.

© All rights reserved Mancini et al. and/or their publisher

 
Edit | Del

Price, Blaine A., Mancini, Clara, Rogers, Yvonne, Bandara, Arosha K., Coe, Tony, Joinson, Adam N., Lay, Jeffrey A. and Nuseibeh, Bashar (2010): ContraVision: presenting contrasting visions of future technology. In: Proceedings of ACM CHI 2010 Conference on Human Factors in Computing Systems 2010. pp. 4759-4764.

How can we best explore the range of users' reactions when developing future technologies that may be controversial, such as personal healthcare systems? Our approach -- ContraVision -- uses futuristic videos, or other narrative forms, that convey both negative and positive aspects of the proposed technology for the same scenarios.

© All rights reserved Price et al. and/or their publisher

 
Edit | Del

Yang, Hui, Roeck, Anne N. De, Gervasi, Vincenzo, Willis, Alistair and Nuseibeh, Bashar (2010): Extending Nocuous Ambiguity Analysis for Anaphora in Natural Language Requirements. In: RE 2010, 18th IEEE International Requirements Engineering Conference, Sydney, New South Wales, Australia, September 27 - October 1, 2010 2010. pp. 25-34.

2009
 
Edit | Del

Thomas, Keerthi, Mancini, Clara, Jedrzejczyk, Lukasz, Bandara, Arosha K., Joinson, Adam, Price, Blaine A., Rogers, Yvonne and Nuseibeh, Bashar (2009): Studying location privacy in mobile applications: 'predator vs. prey' probes. In: Proceedings of the 2009 Symposium on Usable Privacy and Security 2009. p. 33.

 
Edit | Del

Tun, Thein Than, Yu, Yijun, Laney, Robin C. and Nuseibeh, Bashar (2009): Early Identification of Problem Interactions: A Tool-Supported Approach. In: Glinz, Martin and Heymans, Patrick (eds.) Requirements Engineering Foundation for Software Quality, 15th International Working Conference, REFSQ 2009, Amsterdam, The Netherlands, June 8-9, 2009, Proceedings 2009. pp. 74-88.

 
Edit | Del

Tun, Thein Than, Jackson, Michael, Laney, Robin C., Nuseibeh, Bashar and Yu, Yijun (2009): Are Your Lights Off? Using Problem Frames to Diagnose System Failures. In: RE 2009, 17th IEEE International Requirements Engineering Conference, Atlanta, Georgia, USA, August 31 - September 4, 2009 2009. pp. 343-348.

2008
 
Edit | Del

Nhlabatsi, Armstrong, Laney, Robin C. and Nuseibeh, Bashar (2008): Building Contingencies into Specifications. In: 16th IEEE International Requirements Engineering Conference RE 2008 8-12 September, 2008, Barcelona, Catalunya, Spain. pp. 333-334.

2007
 
Edit | Del

Salifu, Mohammed, Yu, Yijun and Nuseibeh, Bashar (2007): Specifying Monitoring and Switching Problems in Context. In: 15th IEEE International Requirements Engineering Conference RE 2007 October 15-19th, 2007, New Delhi, India. pp. 211-220.

2006
 
Edit | Del

Chantree, Francis, Nuseibeh, Bashar, Roeck, Anne N. De and Willis, Alistair (2006): Identifying Nocuous Ambiguities in Natural Language Requirements. In: 14th IEEE International Conference on Requirements Engineering RE 2006 11-15 September, 2006, Minneapolis/St.Paul, Minnesota, USA. pp. 56-65.

 
Edit | Del

Bush, David and Nuseibeh, Bashar (2006): Requirements Engineering Research in Some Future Worlds: An Exercise in Scenario Planning. In: 14th IEEE International Conference on Requirements Engineering RE 2006 11-15 September, 2006, Minneapolis/St.Paul, Minnesota, USA. p. 324.

 
Edit | Del

Haley, Charles B., Laney, Robin C., Moffett, Jonathan D. and Nuseibeh, Bashar (2006): Using trust assumptions with security requirements. In Requir. Eng., 11 (2) pp. 138-151.

2005
 
Edit | Del

Price, Blaine A., Adam, Karim and Nuseibeh, Bashar (2005): Keeping ubiquitous computing to yourself: A practical model for user control of privacy. In International Journal of Human-Computer Studies, 63 (1) pp. 228-253.

As with all the major advances in information and communication technology, ubiquitous computing (ubicomp) introduces new risks to individual privacy. Our analysis of privacy protection in ubicomp has identified four layers through which users must navigate: the regulatory regime they are currently in, the type of ubicomp service required, the type of data being disclosed, and their personal privacy policy. We illustrate and compare the protection afforded by regulation and by some major models for user control of privacy. We identify the shortcomings of each and propose a model which allows user control of privacy levels in a ubicomp environment. Our model balances the user's privacy preferences against the applicable privacy regulations and incorporates five types of user controlled "noise" to protect location privacy by introducing ambiguities. We also incorporate an economics-based approach to assist users in balancing the trade-offs between giving up privacy and receiving ubicomp services. We conclude with a scenario and heuristic evaluation which suggests that regulation can have both positive and negative influences on privacy interfaces in ubicomp and that social translucence is an important heuristic for ubicomp privacy interface functionality.

© All rights reserved Price et al. and/or Academic Press

 
Edit | Del

Crook, Robert, Ince, Darrel C. and Nuseibeh, Bashar (2005): On Modelling Access Policies: Relating Roles to their Organisational Context. In: 13th IEEE International Conference on Requirements Engineering RE 2005 29 August - 2 September, 2005, Paris, France. pp. 157-166.

2004
 
Edit | Del

Haley, Charles B., Laney, Robin C., Moffett, Jonathan D. and Nuseibeh, Bashar (2004): The Effect of Trust Assumptions on the Elaboration of Security Requirements. In: 12th IEEE International Conference on Requirements Engineering RE 2004 6-10 September, 2004, Kyoto, Japan. pp. 102-111.

 
Edit | Del

Haley, Debra Trusso, Nuseibeh, Bashar, Sharp, Helen C. and Taylor, Josie (2004): The Conundrum of Categorising Requirements: Managing Requirements for Learning on the Move. In: 12th IEEE International Conference on Requirements Engineering RE 2004 6-10 September, 2004, Kyoto, Japan. pp. 309-314.

 
Edit | Del

Laney, Robin C., Barroca, Leonor, Jackson, Michael and Nuseibeh, Bashar (2004): Composing Requirements Using Problem Frames. In: 12th IEEE International Conference on Requirements Engineering RE 2004 6-10 September, 2004, Kyoto, Japan. pp. 122-131.

 
Edit | Del

Lin, Luncheng, Nuseibeh, Bashar, Ince, Darrel C. and Jackson, Michael (2004): Using Abuse Frames to Bound the Scope of Security Problems. In: 12th IEEE International Conference on Requirements Engineering RE 2004 6-10 September, 2004, Kyoto, Japan. pp. 354-355.

 
Edit | Del

Rapanotti, Lucia, Hall, Jon G., Jackson, Michael and Nuseibeh, Bashar (2004): Architecture-driven Problem Decomposition. In: 12th IEEE International Conference on Requirements Engineering RE 2004 6-10 September, 2004, Kyoto, Japan. pp. 80-89.

2003
 
Edit | Del

Lin, Luncheng, Nuseibeh, Bashar, Ince, Darrel C., Jackson, Michael and Moffett, Jonathan D. (2003): Introducing Abuse Frames for Analysing Security Requirements. In: 11th IEEE International Conference on Requirements Engineering RE 2003 8-12 September, 2003, Monterey Bay, CA, USA. pp. 371-372.

 
Edit | Del

Nuseibeh, Bashar (2003): Guest editorial. In Requir. Eng., 8 (1) p. 3.

2002
 
Edit | Del

Crook, Robert, Ince, Darrel C., Lin, Luncheng and Nuseibeh, Bashar (2002): Security Requirements Engineering: When Anti-Requirements Hit the Fan. In: 10th Anniversary IEEE Joint International Conference on Requirements Engineering RE 2002 9-13 September, 2002, Essen, Germany. pp. 203-205.

 
Edit | Del

Hall, Jon G., Jackson, Michael, Laney, Robin C., Nuseibeh, Bashar and Rapanotti, Lucia (2002): Relating Software Requirements and Architectures Using Problem Frames. In: 10th Anniversary IEEE Joint International Conference on Requirements Engineering RE 2002 9-13 September, 2002, Essen, Germany. pp. 137-144.

2001
 
Edit | Del

Nuseibeh, Bashar (2001): Weaving Together Requirements and Architectures. In IEEE Computer, 34 (3) pp. 115-117.

2000
 
Edit | Del

Nuseibeh, Bashar, Easterbrook, Steve M. and Russo, Alessandra (2000): Leveraging Inconsistency in Software Development. In IEEE Computer, 33 (4) pp. 24-29.

 
Edit | Del

Nuseibeh, Bashar and Easterbrook, Steve M. (2000): Requirements engineering: a roadmap. In: ICSE - Future of SE Track 2000 2000. pp. 35-46.

 Cited in the following chapter:

Requirements Engineering: [/encyclopedia/requirements_engineering.html]


 
 
Edit | Del

Gervasi, Vincenzo and Nuseibeh, Bashar (2000): Lightweight Validation of Natural Language Requirements: A Case Study. In: ICRE 2000 2000. pp. 140-149.

 
Edit | Del

Nuseibeh, Bashar and Easterbrook, Steve (2000): Requirements engineering: a roadmap. In: Proceedings of the Conference on The Future of Software Engineering 2000. pp. 35-46.

 Cited in the following chapters:

Socio-Technical System Design: [/encyclopedia/socio-technical_system_design.html]

The Evolution of Computing: [/books/the_social_design_of_technical_systems/the_evolution_of_computing.html]


 
1999
 
Edit | Del

Menzies, Tim, Easterbrook, Steve M., Nuseibeh, Bashar and Waugh, Sam (1999): An Empirical Investigation of Multiple Viewpoint Reasoning in Requirements Engineering. In: 4th IEEE International Symposium on Requirements Engineering RE 99 7-11 June, 1999, Limerick, Ireland. pp. 100-.

1998
 
Edit | Del

Russo, Alessandra, Nuseibeh, Bashar and Kramer, Jeff (1998): Restructuring Requirements Specifications For Managing Inconsistency And Change: A Case Study. In: 3rd International Conference on Requirements Engineering ICRE 98, Putting Requirements Engineering to Practice, April 6-10, 1998, Colorado Springs, CO, USA, Proceedings 1998. pp. 51-.

1997
 
Edit | Del

Hunter, Anthony and Nuseibeh, Bashar (1997): Analyzing Inconsistent Specifications. In: 3rd IEEE International Symposium on Requirements Engineering RE97 January 5-8, 1997, Annapolis, MD, USA. pp. 78-86.

 
Edit | Del

Nuseibeh, Bashar and Robertson, Suzanne (1997): Making Requirements Measurable. In: 3rd IEEE International Symposium on Requirements Engineering RE97 January 5-8, 1997, Annapolis, MD, USA. p. 262.

1996
 
Edit | Del

Nuseibeh, Bashar (1996): Conflicting Requirements: When the Customer is Not Always Right. In Requir. Eng., 1 (1) .

1995
 
Edit | Del

Easterbrook, Steve M. and Nuseibeh, Bashar (1995): Managing inconsistencies in an evolving specification. In: Second IEEE International Symposium on Requirements Engineering 1995 March 27 - 29, 1995, York, England. pp. 48-55.

 
Add publication
Show list on your website
 

Join our community and advance:

Your
Skills

Your
Network

Your
Career

 
 
 
 

Changes to this page (author)

11 May 2012: Modified
31 Oct 2011: Modified
31 Oct 2011: Modified
31 Oct 2011: Modified
31 Oct 2011: Modified
31 Oct 2011: Modified
31 Oct 2011: Modified
31 Oct 2011: Added
05 Jul 2011: Modified
02 Nov 2010: Modified
02 Nov 2010: Modified
02 Nov 2010: Modified
02 Nov 2010: Modified
08 Sep 2009: Modified
01 Jun 2009: Modified
01 Jun 2009: Modified
31 May 2009: Modified
31 May 2009: Modified
31 May 2009: Modified
30 May 2009: Modified
30 May 2009: Modified
30 May 2009: Modified
30 May 2009: Modified
30 May 2009: Modified
30 May 2009: Modified
30 May 2009: Modified
30 May 2009: Modified
30 May 2009: Modified
30 May 2009: Modified
30 May 2009: Modified
30 May 2009: Modified
30 May 2009: Modified
30 May 2009: Modified
30 May 2009: Modified
30 May 2009: Modified
30 May 2009: Modified
27 Jun 2007: Added

Page Information

Page maintainer: The Editorial Team
URL: http://www.interaction-design.org/references/authors/bashar_nuseibeh.html

Publication statistics

Pub. period:1995-2011
Pub. count:36
Number of co-authors:43



Co-authors

Number of publications with 3 favourite co-authors:

Blaine A. Price:7
Robin C. Laney:7
Michael Jackson:6

 

 

Productive colleagues

Bashar Nuseibeh's 3 most productive colleagues in number of publications:

Yvonne Rogers:99
Steve M. Easterbro..:24
Adam N. Joinson:20
 
 
 
Jul 14

If you do good work for good clients, it will lead to other good work for other good clients. If you do bad work for bad clients, it will lead to other bad work for other bad clients

-- Michael Bierut

 
 

Featured chapter

Marc Hassenzahl explains the fascinating concept of User Experience and Experience Design. Commentaries by Don Norman, Eric Reiss, Mark Blythe, and Whitney Hess

User Experience and Experience Design !

 
 

Our Latest Books

Kumar and Herger 2013: Gamification at Work: Designing Engaging Business Software...
by Janaki Mythily Kumar and Mario Herger

 
Start reading

Whitworth and Ahmad 2013: The Social Design of Technical Systems: Building technologies for communities...
by Brian Whitworth and Adnan Ahmad

 
Start reading

Soegaard and Dam 2013: The Encyclopedia of Human-Computer Interaction, 2nd Ed....
by Mads Soegaard and Rikke Friis Dam

 
Start reading
 
 

Help us help you!