Bashar Nuseibeh

Personal Homepage
http://mcs.open.ac.uk/ban25/
Employer
()
Email
B.Nuseibeh@open.ac.uk

I am a Professor of Computing at The Open University (Director of Research, 2002-2008), and a Professor of Software Engineering and Chief Scientist at Lero - the Irish Software Engineering Research Centre. Previously, I was a Reader in the Department of Computing at Imperial College London and Head of its Software Engineering Laboratory. I continue my association with Imperial College as a Visiting Professor, and maintain strong research links with the Distributed Software Engineering Group. I am also a Visiting Professor at the National Institute of Informatics, Japan.

Publication Statistics

Publication period start
1995
Publication period end
2011
Number of co-authors
43

Co-authors

Number of publications with favourite co-authors

Productive Colleagues

Most productive colleagues in number of publications

Publications

Haley, Charles B., Laney, Robin C., Moffett, Jonathan D., Nuseibeh, Bashar (2006): Using trust assumptions with security requirements. In Requir. Eng., 11 (2) pp. 138-151. http://dx.doi.org/10.1007/s00766-005-0023-4

Price, Blaine A., Adam, Karim, Nuseibeh, Bashar (2005): Keeping ubiquitous computing to yourself: A practical model for user control of privacy. In International Journal of Human-Computer Studies, 63 (1) pp. 228-253. http://dx.doi.org/10.1016/j.ijhcs.2005.04.008

Nuseibeh, Bashar (2003): Guest editorial. In Requir. Eng., 8 (1) pp. 3. http://dx.doi.org/10.1007/s00766-003-0167-z

Nuseibeh, Bashar (2001): Weaving Together Requirements and Architectures. In IEEE Computer, 34 (3) pp. 115-117. http://csdl.computer.org/comp/mags/co/2001/03/r3115abs.htm

Nuseibeh, Bashar, Easterbrook, Steve M., Russo, Alessandra (2000): Leveraging Inconsistency in Software Development. In IEEE Computer, 33 (4) pp. 24-29.

Nuseibeh, Bashar (1996): Conflicting Requirements: When the Customer is Not Always Right. In Requir. Eng., 1 (1) pp. . http://

Gervasi, Vincenzo, Nuseibeh, Bashar (2000): Lightweight Validation of Natural Language Requirements: A Case Study. In: ICRE 2000 , 2000, . pp. 140-149. http://csdl.computer.org/comp/proceedings/icre/2000/0565/00/05650140abs.htm

Russo, Alessandra, Nuseibeh, Bashar, Kramer, Jeff (1998): Restructuring Requirements Specifications For Managing Inconsistency And Change: A Case St. In: 3rd International Conference on Requirements Engineering ICRE 98, Putting Requirements Engineering to Practice, April 6-10, 1998, Colorado Springs, CO, USA, Proceedings , 1998, . pp. 51-. http://csdl.computer.org/comp/proceedings/icre/1998/8356/00/83560051abs.htm

Nuseibeh, Bashar, Easterbrook, Steve M. (2000): Requirements engineering: a roadmap. In: ICSE - Future of SE Track 2000 , 2000, . pp. 35-46. http://doi.acm.org/10.1145/336512.336523

Tun, Thein Than, Jackson, Michael, Laney, Robin C., Nuseibeh, Bashar, Yu, Yijun (2009): Are Your Lights Off? Using Problem Frames to Diagnose System Failures. In: RE 2009, 17th IEEE International Requirements Engineering Conference, Atlanta, Georgia, USA, August 31 - September 4, 2009 , 2009, . pp. 343-348. http://doi.ieeecomputersociety.org/10.1109/RE.2009.31

Yang, Hui, Roeck, Anne N. De, Gervasi, Vincenzo, Willis, Alistair, Nuseibeh, Bashar (2010): Extending Nocuous Ambiguity Analysis for Anaphora in Natural Language Requirements. In: RE 2010, 18th IEEE International Requirements Engineering Conference, Sydney, New South Wales, Australia, September 27 - October 1, 2010 , 2010, . pp. 25-34. http://dx.doi.org/10.1109/RE.2010.14

Tun, Thein Than, Yu, Yijun, Laney, Robin C., Nuseibeh, Bashar (2009): Early Identification of Problem Interactions: A Tool-Supported Approach. In: Glinz, Martin, Heymans, Patrick (eds.) Requirements Engineering Foundation for Software Quality, 15th International Working Conference, REFSQ 2009, Amsterdam, The Netherlands, June 8-9, 2009, Proceedings , 2009, . pp. 74-88. http://dx.doi.org/10.1007/978-3-642-02050-6_7

Mancini, Clara, Rogers, Yvonne, Thomas, Keerthi, Joinson, Adam N., Price, Blaine A., Bandara, Arosha K., Jedrzejczyk, Lukasz, Nuseibeh, Bashar (2011): In the best families: tracking and relationships. In: Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems , 2011, . pp. 2419-2428. http://dx.doi.org/10.1145/1978942.1979296

Price, Blaine A., Mancini, Clara, Rogers, Yvonne, Bandara, Arosha K., Coe, Tony, Joinson, Adam N., Lay, Jeffrey A., Nuseibeh, Bashar (2010): ContraVision: presenting contrasting visions of future technology. In: Proceedings of ACM CHI 2010 Conference on Human Factors in Computing Systems , 2010, . pp. 4759-4764. http://doi.acm.org/10.1145/1753846.1754227

Mancini, Clara, Rogers, Yvonne, Bandara, Arosha K., Coe, Tony, Jedrzejczyk, Lukasz, Joinson, Adam N., Price, Blaine A., Thomas, Keerthi, Nuseibeh, Bashar (2010): Contravision: exploring users' reactions to futuristic technology. In: Proceedings of ACM CHI 2010 Conference on Human Factors in Computing Systems , 2010, . pp. 153-162. http://doi.acm.org/10.1145/1753326.1753350

Jedrzejczyk, Lukasz, Price, Blaine A., Bandara, Arosha K., Nuseibeh, Bashar (2010): On the impact of real-time feedback on users' behaviour in mobile location-sharing applica. In: Proceedings of the 2010 Symposium on Usable Privacy and Security , 2010, . pp. 14. http://doi.acm.org/10.1145/1837110.1837129

Jedrzejczyk, Lukasz, Price, Blaine A., Bandara, Arosha, Nuseibeh, Bashar (2010): "Privacy-shake",: a haptic interface for managing privacy settings in mobile location shar. In: Proceedings of 12th Conference on Human-computer interaction with mobile devices and services , 2010, . pp. 411-412. http://doi.acm.org/10.1145/1851600.1851690

Thomas, Keerthi, Mancini, Clara, Jedrzejczyk, Lukasz, Bandara, Arosha K., Joinson, Adam, Price, Blaine A., Rogers, Yvonne, Nuseibeh, Bashar (2009): Studying location privacy in mobile applications: \'predator vs. prey\' probes. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 33. http://doi.acm.org/10.1145/1572532.1572572

Crook, Robert, Ince, Darrel C., Nuseibeh, Bashar (2005): On Modelling Access Policies: Relating Roles to their Organisational Context. In: 13th IEEE International Conference on Requirements Engineering RE 2005 29 August - 2 September, 2005, Paris, France. pp. 157-166. http://doi.ieeecomputersociety.org/10.1109/RE.2005.48

Easterbrook, Steve M., Nuseibeh, Bashar (1995): Managing inconsistencies in an evolving specification. In: Second IEEE International Symposium on Requirements Engineering 1995 March 27 - 29, 1995, York, England. pp. 48-55. http://csdl.computer.org/comp/proceedings/re/1995/7017/00/70170048abs.htm

Lin, Luncheng, Nuseibeh, Bashar, Ince, Darrel C., Jackson, Michael, Moffett, Jonathan D. (2003): Introducing Abuse Frames for Analysing Security Requirements. In: 11th IEEE International Conference on Requirements Engineering RE 2003 8-12 September, 2003, Monterey Bay, CA, USA. pp. 371-372. http://csdl.computer.org/comp/proceedings/re/2003/1980/00/19800371abs.htm

Haley, Charles B., Laney, Robin C., Moffett, Jonathan D., Nuseibeh, Bashar (2004): The Effect of Trust Assumptions on the Elaboration of Security Requirements. In: 12th IEEE International Conference on Requirements Engineering RE 2004 6-10 September, 2004, Kyoto, Japan. pp. 102-111. http://doi.ieeecomputersociety.org/10.1109/RE.2004.50

Haley, Debra Trusso, Nuseibeh, Bashar, Sharp, Helen C., Taylor, Josie (2004): The Conundrum of Categorising Requirements: Managing Requirements for Learning on the Move. In: 12th IEEE International Conference on Requirements Engineering RE 2004 6-10 September, 2004, Kyoto, Japan. pp. 309-314. http://doi.ieeecomputersociety.org/10.1109/RE.2004.49

Hall, Jon G., Jackson, Michael, Laney, Robin C., Nuseibeh, Bashar, Rapanotti, Lucia (2002): Relating Software Requirements and Architectures Using Problem Frames. In: 10th Anniversary IEEE Joint International Conference on Requirements Engineering RE 2002 9-13 September, 2002, Essen, Germany. pp. 137-144. http://csdl.computer.org/comp/proceedings/re/2002/1465/00/14650137abs.htm

Hunter, Anthony, Nuseibeh, Bashar (1997): Analyzing Inconsistent Specifications. In: 3rd IEEE International Symposium on Requirements Engineering RE97 January 5-8, 1997, Annapolis, MD, USA. pp. 78-86. http://csdl.computer.org/comp/proceedings/re/1997/7740/00/77400078abs.htm

Laney, Robin C., Barroca, Leonor, Jackson, Michael, Nuseibeh, Bashar (2004): Composing Requirements Using Problem Frames. In: 12th IEEE International Conference on Requirements Engineering RE 2004 6-10 September, 2004, Kyoto, Japan. pp. 122-131. http://doi.ieeecomputersociety.org/10.1109/RE.2004.11

Lin, Luncheng, Nuseibeh, Bashar, Ince, Darrel C., Jackson, Michael (2004): Using Abuse Frames to Bound the Scope of Security Problems. In: 12th IEEE International Conference on Requirements Engineering RE 2004 6-10 September, 2004, Kyoto, Japan. pp. 354-355. http://doi.ieeecomputersociety.org/10.1109/RE.2004.54

Menzies, Tim, Easterbrook, Steve M., Nuseibeh, Bashar, Waugh, Sam (1999): An Empirical Investigation of Multiple Viewpoint Reasoning in Requirements Engineering. In: 4th IEEE International Symposium on Requirements Engineering RE 99 7-11 June, 1999, Limerick, Ireland. pp. 100-. http://csdl.computer.org/comp/proceedings/re/1999/0188/00/01880100abs.htm

Crook, Robert, Ince, Darrel C., Lin, Luncheng, Nuseibeh, Bashar (2002): Security Requirements Engineering: When Anti-Requirements Hit the Fan. In: 10th Anniversary IEEE Joint International Conference on Requirements Engineering RE 2002 9-13 September, 2002, Essen, Germany. pp. 203-205. http://csdl.computer.org/comp/proceedings/re/2002/1465/00/14650203abs.htm

Nuseibeh, Bashar, Robertson, Suzanne (1997): Making Requirements Measurable. In: 3rd IEEE International Symposium on Requirements Engineering RE97 January 5-8, 1997, Annapolis, MD, USA. pp. 262. http://csdl.computer.org/comp/proceedings/re/1997/7740/00/77400262abs.htm

Rapanotti, Lucia, Hall, Jon G., Jackson, Michael, Nuseibeh, Bashar (2004): Architecture-driven Problem Decomposition. In: 12th IEEE International Conference on Requirements Engineering RE 2004 6-10 September, 2004, Kyoto, Japan. pp. 80-89. http://doi.ieeecomputersociety.org/10.1109/RE.2004.7

Chantree, Francis, Nuseibeh, Bashar, Roeck, Anne N. De, Willis, Alistair (2006): Identifying Nocuous Ambiguities in Natural Language Requirements. In: 14th IEEE International Conference on Requirements Engineering RE 2006 11-15 September, 2006, Minneapolis/St.Paul, Minnesota, USA. pp. 56-65. http://doi.ieeecomputersociety.org/10.1109/RE.2006.31

Nhlabatsi, Armstrong, Laney, Robin C., Nuseibeh, Bashar (2008): Building Contingencies into Specifications. In: 16th IEEE International Requirements Engineering Conference RE 2008 8-12 September, 2008, Barcelona, Catalunya, Spain. pp. 333-334. http://dx.doi.org/10.1109/RE.2008.65

Salifu, Mohammed, Yu, Yijun, Nuseibeh, Bashar (2007): Specifying Monitoring and Switching Problems in Context. In: 15th IEEE International Requirements Engineering Conference RE 2007 October 15-19th, 2007, New Delhi, India. pp. 211-220. http://dx.doi.org/10.1109/RE.2007.21

Bush, David, Nuseibeh, Bashar (2006): Requirements Engineering Research in Some Future Worlds: An Exercise in Scenario Planning. In: 14th IEEE International Conference on Requirements Engineering RE 2006 11-15 September, 2006, Minneapolis/St.Paul, Minnesota, USA. pp. 324. http://doi.ieeecomputersociety.org/10.1109/RE.2006.55

Nuseibeh, Bashar, Easterbrook, Steve (2000): Requirements engineering: a roadmap. In: Proceedings of the Conference on The Future of Software Engineering , 2000, . pp. 35-46.