Dr Inah Omoronyia

  • Honorary Lecturer (School of Computing Science)

email: Inah.Omoronyia@glasgow.ac.uk

Room S152, Level S, School of Computing Science, Sir Alwyn Williams Building, Glasgow G12 8QQ

Import to contacts

ORCID iDhttps://orcid.org/0000-0001-5357-0945

Research interests

Publications

Selected publications

Omoronyia, I. , Cavallaro, L., Salehie, M., Pasquale, L. and Nuseibeh, B. (2013) Engineering adaptive privacy: on the role of privacy awareness requirements. In: 35th International Conference on Software Engineering (ICSE 2013): Proceedings, San Francisco, CA, USA, 18-26 May 2013, pp. 632-641. (doi: 10.1109/ICSE.2013.6606609)

Omoronyia, I. , Ferguson, J., Roper, M. and Wood, M. (2009) Using developer activity data to enhance awareness during collaborative software development. Computer Supported Cooperative Work, 18(5-6), pp. 509-558. (doi: 10.1007/s10606-009-9104-0)

All publications

List by: Type | Date

Jump to: 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2013 | 2012 | 2011 | 2010 | 2009 | 2007
Number of items: 36.

2021

Inglis, P. and Omoronyia, I. (2021) Analysing Privacy Conflicts in Web-Based Systems. In: 29th IEEE International Requirements Engineering Conference (RE2021), Notre Dame, IN, USA, 20-24 Sept 2021, pp. 430-431. ISBN 9781665428569 (doi: 10.1109/RE51729.2021.00055)

2020

Alahmari, S., Renaud, K. and Omoronyia, I. (2020) Implement a Model for Describing and Maximising Security Knowledge Sharing. In: 15th International Conference for Internet Technology and Secured Transactions (ICITST-2020), 8-10 Dec 2020, ISBN 9781913572211 (doi: 10.23919/ICITST51030.2020.9351318)

Alahmari, S., Renaud, K. and Omoronyia, I. (2020) A Model for Describing and Maximising Security Knowledge Sharing to Enhance Security Awareness. In: 16th European Mediterranean and Middle Eastern Conference on Information Systems (EMCIS 2019), Dubai, United Arab Emirates, 09-10 Dec 2019, pp. 376-390. ISBN 9783030443214 (doi: 10.1007/978-3-030-44322-1_28)

Olukoya, O. , Mackenzie, L. and Omoronyia, I. (2020) Towards using unstructured user input request for malware detection. Computers and Security, 93, 101783. (doi: 10.1016/j.cose.2020.101783)

Olukoya, O. , Mackenzie, L. and Omoronyia, I. (2020) Security-oriented view of app behaviour using textual descriptions and user-granted permission requests. Computers and Security, 89, 101685. (doi: 10.1016/j.cose.2019.101685)

2019

Omoronyia, I. , Etuk, U. and Inglis, P. (2019) A privacy awareness system for software design. International Journal of Software Engineering and Knowledge Engineering, 29(10), pp. 1557-1604. (doi: 10.1142/S0218194019500499)

2018

Al Ahmari, S., Renaud, K. and Omoronyia, I. (2018) A Systematic Review of Information Security Knowledge-Sharing Research. In: 12th International Symposium on Human Aspects of Information Security & Assurance (HAISA 2018), Dundee, Scotland, 29-31 Aug 2018, pp. 101-110. ISBN 9780244402549

Olukoya, O. , Mackenzie, L. and Omoronyia, I. (2018) Permission-based Risk Signals for App Behaviour Characterization in Android Apps. In: 5th International Conference on Information Systems Security and Privacy, Prague, Czech Republic, 23-25 Feb 2019, pp. 183-192. ISBN 9789897583599 (doi: 10.5220/0007248701830192)

2017

Omoronyia, I. (2017) Privacy Engineering in Dynamic Settings. In: ICSE 2017: IEEE/ACM 39th International Conference on Software Engineering Companion, Buenos Aires, Argentina, 20-28 May 2017, pp. 297-299. ISBN 9781538615898 (doi: 10.1109/ICSE-C.2017.89)

2016

Omoronyia, I. (2016) Reasoning with Imprecise Privacy Preferences. In: FSE 2016: ACM SIGSOFT International Symposium on the Foundations of Software Engineering, Seattle, WA, USA, 13-18 Nov 2016, pp. 952-955. ISBN 9781450342186 (doi: 10.1145/2950290.2983982)

Omoronyia, I. (2016) The case for privacy awareness requirements. International Journal of Secure Software Engineering, 7(2), pp. 19-36. (doi: 10.4018/IJSSE.2016040102)

2013

Ali, R., Solis, C., Omoronyia, I. , Salehie, M. and Nuseibeh, B. (2013) Social adaptation at runtime. In: Maciaszek, L.A. and Filipe, J. (eds.) Evaluation of Novel Approaches to Software Engineering. Series: Communications in computer and information science (410). Springer: Berlin, pp. 110-127. ISBN 9783642454219 (doi: 10.1007/978-3-642-45422-6_8)

Daramola, O., Stålhane, T., Omoronyia, I. and Sindre, G. (2013) Using ontologies and machine learning for hazard identification and safety analysis. In: Maalej, W. and Thurimella, A. K. (eds.) Managing Requirements Knowledge. Springer: Heidelberg, pp. 117-141. ISBN 9783642344190

Omoronyia, I. , Cavallaro, L., Salehie, M., Pasquale, L. and Nuseibeh, B. (2013) Engineering adaptive privacy: on the role of privacy awareness requirements. In: 35th International Conference on Software Engineering (ICSE 2013): Proceedings, San Francisco, CA, USA, 18-26 May 2013, pp. 632-641. (doi: 10.1109/ICSE.2013.6606609)

2012

Ali, R., Solis, C., Omoronyia, I. , Salehie, M. and Nuseibeh, B. (2012) Social adaptation: When software gives users a voice. In: 7th International Conference on Evaluation of Novel Approaches to Software Engineering, Wrocław, Poland, 29-30 Jun 2012,

Omoronyia, I. , Pasquale, L., Salehie, M., Doherty, G. and Nuseibeh, B. (2012) Caprice - A requirements driven tool for engineering adaptive mobile privacy. In: 27th IEEE/ACM International Conference on Automated Software Engineering, Essen, Germany, 3-7 Sept 2012,

Pasquale, L., Menghi, C., Salehie, M., Cavallaro, L., Omoronyia, I. and Nuseibeh, B. (2012) SecuriTAS: a Tool for Engineering Adaptive Security. In: 20th International Symposium on Foundations of Software Engineering (FSE 2012), Cary, North Caroline, USA, 11-16 Nov 2012,

Pasquale, L., Salehie, M., Ali, R., Omoronyia, I. and Nuseibeh, B. (2012) On the role of primary and secondary assets in adaptive security: an application in smart grids. In: 7th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, Zürich, Switzerland, 4-5 Jun 2012,

Salehie, M., Pasquale, L., Omoronyia, I. , Ali, R. and Nuseibeh, B. (2012) Requirements-driven adaptive security: protecting variable assets at runtime. In: 20th IEEE International Requirements Engineering Conference, Chicago, ILL, USA, 24-28 Sept 2012, (doi: 10.1109/RE.2012.6345794)

Salehie, M., Pasquale, L., Omoronyia, I. and Nuseibeh, B. (2012) Adaptive security and privacy in smart grids: a software engineering vision. In: ICSE 2012 International Workshop on Software Engineering Challenges for the Smart Grid, Zurich, Switzerland, 3 Jun 2012,

Salehie, M., Pasquale, L., Omoronyia, I. and Nuseibeh, B. (2012) Towards self-protecting smart metering: Investigating requirements for the MAPE loop. In: 9th IEEE International Conference and Workshops on the Engineering of Autonomic and Autonomous Systems, Novi Sad, Serbia, 11-13 Apr 2012,

Tun, T., Bandara, A., Price, B., Yu, Y., Haley, C., Omoronyia, I. and Nuseibeh, B. (2012) Privacy arguments: Analysing selective disclosure requirements for mobile applications. In: 20th IEEE International Requirements Engineering Conference, Chicago, ILL, USA, 24-28 Sept 2012,

2011

Ali, R., Solis, C., Salehie, M., Omoronyia, I. , Nuseibeh, B. and Maalej, W. (2011) Social sensing: When users become monitors. In: ESEC/FSE 2011, Szeged, Hungary, 5-9 Sept 2011, pp. 476-479.

Daramola, O., Stålhane, T., Omoronyia, I. and Sindre, G. (2011) Enabling hazard identification from requirements and reuse-oriented HAZOP analysis. In: 4th International Workshop on Managing Requirements Knowledge (MaRK’11), Trento, Italy, 30 Aug 2011,

Farfeleder, S., Moser, T., Krall, A., Stålhane, T., Omoronyia, I. and Zojer, H. (2011) Ontology-driven guidance for requirements elicitation. In: 8th Extended Semantic Web Conference, ESWC 2011, Heraklion, Crete, Greece, 29 May-2 Jun 2011, pp. 212-226.

Omoronyia, I. , Salehie, M., Ali, R., Kaiya, H. and Nuseibeh, B. (2011) Misuse case techniques for mobile privacy. In: 1st International Workshop on Mobile Privacy Management (PriMo2011), Copenhagen, Denmark, 27 Jun 2011,

Omoronyia, I. , Sindre, G., Biffl, S. and Stålhane, T. (2011) Understanding architectural elements from requirements traceability networks. In: Avgeriou, P., Grundy, J., Hall, J.G., Lago, P. and Mistrik, I. (eds.) Relating Software Requirements and Architectures. Springer: Heidelberg, Germany, pp. 61-83. ISBN 9783642210013 (doi: 10.1007/978-3-642-21001-3)

Omoronyia, I. , Sindre, G. and Stålhane, T. (2011) Exploring a Bayesian and linear approach to requirements traceability. Information and Software Technology, 53(8), pp. 851-871. (doi: 10.1016/j.infsof.2011.03.001)

2010

Omoronyia, I. , Ferguson, J., Roper, M. and Wood, M. (2010) A review of awareness in distributed collaborative software engineering. Software: Practice and Experience, 40(12), pp. 1107-1133. (doi: 10.1002/spe.1005)

Omoronyia, I. , Sindre, G., Stålhane, T., Biffl, S., Moser, T. and Sunindyo, W. (2010) A domain ontology building process for guiding requirements elicitation. Lecture Notes in Computer Science, 6182, pp. 188-202. (doi: 10.1007/978-3-642-14192-8_18)

Stålhane, T., Omoronyia, I. and Reicenbach, F. (2010) Ontology-guided requirements and safety analysis. In: 6th International Conference on Safety of Industrial Automated Systems, Tampere Hall, Finland, 14-15 Jun 2010,

2009

Omoronyia, I. , Ferguson, J., Roper, M. and Wood, M. (2009) Using developer activity data to enhance awareness during collaborative software development. Computer Supported Cooperative Work, 18(5-6), pp. 509-558. (doi: 10.1007/s10606-009-9104-0)

Omoronyia, I. , Sindre, G., Ferguson, J., Roper, M. and Wood, M. (2009) Use case to source code traceability: The developer navigation view point. In: 17th IEEE International Requirements Engineering Conference, Atlanta, GA, USA, 31 Aug-4 Sept 2009,

Omoronyia, I. , Sindre, G. and Stålhane, T. (2009) Uncovering information centres in requirements traceability networks. In: 12th Australian Workshop on Requirements Engineering, Sydney, Australia, 2 Oct 2009,

2007

Omoronyia, I. , Ferguson, J., Roper, M. and Wood, M. (2007) A 3-dimensional relevance model for collaborative software engineering spaces. In: 2nd IEEE International Conference on Global Software Engineering, ICGSE 2007, Munich, Germany, 27-30 Aug 2007,

Omoronyia, I. , Ferguson, J., Roper, M. and Wood, M. (2007) Using relevance to share knowledge and understanding in collaborative software engineering spaces. In: 10th European Conference on Computer-Supported Cooperative Work (ECSCW'07), Limerick, Ireland, 25 Sept 2007,

This list was generated on Fri Apr 19 08:17:23 2024 BST.
Number of items: 36.

Articles

Olukoya, O. , Mackenzie, L. and Omoronyia, I. (2020) Towards using unstructured user input request for malware detection. Computers and Security, 93, 101783. (doi: 10.1016/j.cose.2020.101783)

Olukoya, O. , Mackenzie, L. and Omoronyia, I. (2020) Security-oriented view of app behaviour using textual descriptions and user-granted permission requests. Computers and Security, 89, 101685. (doi: 10.1016/j.cose.2019.101685)

Omoronyia, I. , Etuk, U. and Inglis, P. (2019) A privacy awareness system for software design. International Journal of Software Engineering and Knowledge Engineering, 29(10), pp. 1557-1604. (doi: 10.1142/S0218194019500499)

Omoronyia, I. (2016) The case for privacy awareness requirements. International Journal of Secure Software Engineering, 7(2), pp. 19-36. (doi: 10.4018/IJSSE.2016040102)

Omoronyia, I. , Sindre, G. and Stålhane, T. (2011) Exploring a Bayesian and linear approach to requirements traceability. Information and Software Technology, 53(8), pp. 851-871. (doi: 10.1016/j.infsof.2011.03.001)

Omoronyia, I. , Ferguson, J., Roper, M. and Wood, M. (2010) A review of awareness in distributed collaborative software engineering. Software: Practice and Experience, 40(12), pp. 1107-1133. (doi: 10.1002/spe.1005)

Omoronyia, I. , Sindre, G., Stålhane, T., Biffl, S., Moser, T. and Sunindyo, W. (2010) A domain ontology building process for guiding requirements elicitation. Lecture Notes in Computer Science, 6182, pp. 188-202. (doi: 10.1007/978-3-642-14192-8_18)

Omoronyia, I. , Ferguson, J., Roper, M. and Wood, M. (2009) Using developer activity data to enhance awareness during collaborative software development. Computer Supported Cooperative Work, 18(5-6), pp. 509-558. (doi: 10.1007/s10606-009-9104-0)

Book Sections

Ali, R., Solis, C., Omoronyia, I. , Salehie, M. and Nuseibeh, B. (2013) Social adaptation at runtime. In: Maciaszek, L.A. and Filipe, J. (eds.) Evaluation of Novel Approaches to Software Engineering. Series: Communications in computer and information science (410). Springer: Berlin, pp. 110-127. ISBN 9783642454219 (doi: 10.1007/978-3-642-45422-6_8)

Daramola, O., Stålhane, T., Omoronyia, I. and Sindre, G. (2013) Using ontologies and machine learning for hazard identification and safety analysis. In: Maalej, W. and Thurimella, A. K. (eds.) Managing Requirements Knowledge. Springer: Heidelberg, pp. 117-141. ISBN 9783642344190

Omoronyia, I. , Sindre, G., Biffl, S. and Stålhane, T. (2011) Understanding architectural elements from requirements traceability networks. In: Avgeriou, P., Grundy, J., Hall, J.G., Lago, P. and Mistrik, I. (eds.) Relating Software Requirements and Architectures. Springer: Heidelberg, Germany, pp. 61-83. ISBN 9783642210013 (doi: 10.1007/978-3-642-21001-3)

Conference Proceedings

Inglis, P. and Omoronyia, I. (2021) Analysing Privacy Conflicts in Web-Based Systems. In: 29th IEEE International Requirements Engineering Conference (RE2021), Notre Dame, IN, USA, 20-24 Sept 2021, pp. 430-431. ISBN 9781665428569 (doi: 10.1109/RE51729.2021.00055)

Alahmari, S., Renaud, K. and Omoronyia, I. (2020) Implement a Model for Describing and Maximising Security Knowledge Sharing. In: 15th International Conference for Internet Technology and Secured Transactions (ICITST-2020), 8-10 Dec 2020, ISBN 9781913572211 (doi: 10.23919/ICITST51030.2020.9351318)

Alahmari, S., Renaud, K. and Omoronyia, I. (2020) A Model for Describing and Maximising Security Knowledge Sharing to Enhance Security Awareness. In: 16th European Mediterranean and Middle Eastern Conference on Information Systems (EMCIS 2019), Dubai, United Arab Emirates, 09-10 Dec 2019, pp. 376-390. ISBN 9783030443214 (doi: 10.1007/978-3-030-44322-1_28)

Al Ahmari, S., Renaud, K. and Omoronyia, I. (2018) A Systematic Review of Information Security Knowledge-Sharing Research. In: 12th International Symposium on Human Aspects of Information Security & Assurance (HAISA 2018), Dundee, Scotland, 29-31 Aug 2018, pp. 101-110. ISBN 9780244402549

Olukoya, O. , Mackenzie, L. and Omoronyia, I. (2018) Permission-based Risk Signals for App Behaviour Characterization in Android Apps. In: 5th International Conference on Information Systems Security and Privacy, Prague, Czech Republic, 23-25 Feb 2019, pp. 183-192. ISBN 9789897583599 (doi: 10.5220/0007248701830192)

Omoronyia, I. (2017) Privacy Engineering in Dynamic Settings. In: ICSE 2017: IEEE/ACM 39th International Conference on Software Engineering Companion, Buenos Aires, Argentina, 20-28 May 2017, pp. 297-299. ISBN 9781538615898 (doi: 10.1109/ICSE-C.2017.89)

Omoronyia, I. (2016) Reasoning with Imprecise Privacy Preferences. In: FSE 2016: ACM SIGSOFT International Symposium on the Foundations of Software Engineering, Seattle, WA, USA, 13-18 Nov 2016, pp. 952-955. ISBN 9781450342186 (doi: 10.1145/2950290.2983982)

Omoronyia, I. , Cavallaro, L., Salehie, M., Pasquale, L. and Nuseibeh, B. (2013) Engineering adaptive privacy: on the role of privacy awareness requirements. In: 35th International Conference on Software Engineering (ICSE 2013): Proceedings, San Francisco, CA, USA, 18-26 May 2013, pp. 632-641. (doi: 10.1109/ICSE.2013.6606609)

Ali, R., Solis, C., Omoronyia, I. , Salehie, M. and Nuseibeh, B. (2012) Social adaptation: When software gives users a voice. In: 7th International Conference on Evaluation of Novel Approaches to Software Engineering, Wrocław, Poland, 29-30 Jun 2012,

Omoronyia, I. , Pasquale, L., Salehie, M., Doherty, G. and Nuseibeh, B. (2012) Caprice - A requirements driven tool for engineering adaptive mobile privacy. In: 27th IEEE/ACM International Conference on Automated Software Engineering, Essen, Germany, 3-7 Sept 2012,

Pasquale, L., Menghi, C., Salehie, M., Cavallaro, L., Omoronyia, I. and Nuseibeh, B. (2012) SecuriTAS: a Tool for Engineering Adaptive Security. In: 20th International Symposium on Foundations of Software Engineering (FSE 2012), Cary, North Caroline, USA, 11-16 Nov 2012,

Pasquale, L., Salehie, M., Ali, R., Omoronyia, I. and Nuseibeh, B. (2012) On the role of primary and secondary assets in adaptive security: an application in smart grids. In: 7th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, Zürich, Switzerland, 4-5 Jun 2012,

Salehie, M., Pasquale, L., Omoronyia, I. , Ali, R. and Nuseibeh, B. (2012) Requirements-driven adaptive security: protecting variable assets at runtime. In: 20th IEEE International Requirements Engineering Conference, Chicago, ILL, USA, 24-28 Sept 2012, (doi: 10.1109/RE.2012.6345794)

Salehie, M., Pasquale, L., Omoronyia, I. and Nuseibeh, B. (2012) Adaptive security and privacy in smart grids: a software engineering vision. In: ICSE 2012 International Workshop on Software Engineering Challenges for the Smart Grid, Zurich, Switzerland, 3 Jun 2012,

Salehie, M., Pasquale, L., Omoronyia, I. and Nuseibeh, B. (2012) Towards self-protecting smart metering: Investigating requirements for the MAPE loop. In: 9th IEEE International Conference and Workshops on the Engineering of Autonomic and Autonomous Systems, Novi Sad, Serbia, 11-13 Apr 2012,

Tun, T., Bandara, A., Price, B., Yu, Y., Haley, C., Omoronyia, I. and Nuseibeh, B. (2012) Privacy arguments: Analysing selective disclosure requirements for mobile applications. In: 20th IEEE International Requirements Engineering Conference, Chicago, ILL, USA, 24-28 Sept 2012,

Ali, R., Solis, C., Salehie, M., Omoronyia, I. , Nuseibeh, B. and Maalej, W. (2011) Social sensing: When users become monitors. In: ESEC/FSE 2011, Szeged, Hungary, 5-9 Sept 2011, pp. 476-479.

Daramola, O., Stålhane, T., Omoronyia, I. and Sindre, G. (2011) Enabling hazard identification from requirements and reuse-oriented HAZOP analysis. In: 4th International Workshop on Managing Requirements Knowledge (MaRK’11), Trento, Italy, 30 Aug 2011,

Farfeleder, S., Moser, T., Krall, A., Stålhane, T., Omoronyia, I. and Zojer, H. (2011) Ontology-driven guidance for requirements elicitation. In: 8th Extended Semantic Web Conference, ESWC 2011, Heraklion, Crete, Greece, 29 May-2 Jun 2011, pp. 212-226.

Omoronyia, I. , Salehie, M., Ali, R., Kaiya, H. and Nuseibeh, B. (2011) Misuse case techniques for mobile privacy. In: 1st International Workshop on Mobile Privacy Management (PriMo2011), Copenhagen, Denmark, 27 Jun 2011,

Stålhane, T., Omoronyia, I. and Reicenbach, F. (2010) Ontology-guided requirements and safety analysis. In: 6th International Conference on Safety of Industrial Automated Systems, Tampere Hall, Finland, 14-15 Jun 2010,

Omoronyia, I. , Sindre, G., Ferguson, J., Roper, M. and Wood, M. (2009) Use case to source code traceability: The developer navigation view point. In: 17th IEEE International Requirements Engineering Conference, Atlanta, GA, USA, 31 Aug-4 Sept 2009,

Omoronyia, I. , Sindre, G. and Stålhane, T. (2009) Uncovering information centres in requirements traceability networks. In: 12th Australian Workshop on Requirements Engineering, Sydney, Australia, 2 Oct 2009,

Omoronyia, I. , Ferguson, J., Roper, M. and Wood, M. (2007) A 3-dimensional relevance model for collaborative software engineering spaces. In: 2nd IEEE International Conference on Global Software Engineering, ICGSE 2007, Munich, Germany, 27-30 Aug 2007,

Omoronyia, I. , Ferguson, J., Roper, M. and Wood, M. (2007) Using relevance to share knowledge and understanding in collaborative software engineering spaces. In: 10th European Conference on Computer-Supported Cooperative Work (ECSCW'07), Limerick, Ireland, 25 Sept 2007,

This list was generated on Fri Apr 19 08:17:23 2024 BST.

Supervision

  • Leong, Rech
    Towards Cohesive Evaluation of Explainable Artificial Intelligence Algorithms