Professor Chris Johnson

  • Head of School/Professor of Computing Science (Computing Science)

telephone: 01413306053
email: christopher.johnson@glasgow.ac.uk

Research interests

Personal site: http://www.dcs.gla.ac.uk/~johnson

 

 

Biography:
Chris Johnson develops new techniques to support the development of complex safety and security critical systems. Over the last ten years, he has helped to author guidelines for the investigation of incidents and accidents across both the European aviation and railway industries. He has worked with members of the European Space Agency and with NASA on the software engineering of future space missions. He has also worked on security concerns with global navigation satellite systems. His team have also worked with various agencies around the world to develop simulations of mass evacuations following terrorist attacks and natural disasters. He is co-chair of the scientific advisory board for the €2 billion SESAR programme for the modernisation of European Air Traffic Management.

Research Interests:
- Safety
- Security
- Risk Assessment
- Software
- Configuration Management
- Contingency Planning
- Accident Analysis
- Incident reporting

Selected publications

Supervision

All publications

List by: Type | Date

Jump to: 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001
Number of items: 127.

2017

Johnson, C. W., Evangelopoulou, M. and Pavlova, T. (2017) Applying Lessons from Cyber Attacks on Ukrainian Infrastructures to Secure Gateways onto the Industrial Internet of Things. Proceedings 35th International System Safety Conference, Albuquerque, NM, USA, 21-25 Aug 2017.

Johnson, C. W., Saleem, M. H., Evangelopoulou, M., Cook, M., Harkness, R. and Barker, T. (2017) Defending Against Firmware Cyber Attacks on Safety-Critical Systems. Proceedings 35th International System Safety Conference, Albuquerque, NM, USA, 21-25 Aug 2017.

Vuorio, A., Stoop, J. and Johnson, C. (2017) The need to establish consistent international safety investigation guidelines for the chemical industries. Safety Science, 95, pp. 62-74. (doi:10.1016/j.ssci.2017.02.003)

He, Y. and Johnson, C. (2017) Challenges of information security incident learning: an industrial case study in a Chinese healthcare organization. Informatics for Health and Social Care, 42(4), pp. 393-408. (doi:10.1080/17538157.2016.1255629) (PMID:28068150)

2016

Lu, Y., Miller, A. A. , Hoffmann, R. and Johnson, C. W. (2016) Towards the automated verification of Weibull distributions for system failure rates. Lecture Notes in Computer Science, 9933, pp. 81-96. (doi:10.1007/978-3-319-45943-1_6)

Sujan, M. A., Habli, I., Kelly, T. P., Pozzi, S. and Johnson, C. W. (2016) Should healthcare providers do safety cases? Lessons from a cross-industry review of safety case practices. Safety Science, 84, pp. 181-189. (doi:10.1016/j.ssci.2015.12.021)

Peng, Z., Lu, Y., Miller, A. , Tingdi, Z. and Johnson, C. (2016) Formal specification and quantitative analysis of a constellation of navigation satellites. Quality and Reliability Engineering International, 32(2), pp. 345-361. (doi:10.1002/qre.1754)

Peng, Z., Lu, Y., Miller, A. , Johnson, C. and Zhao, T. (2016) Risk assessment of railway transportation systems using timed fault trees. Quality and Reliability Engineering International, 32(1), pp. 181-194. (doi:10.1002/qre.1738)

Johnson, C. (2016) Securing the Participation of Safety-Critical SCADA Systems in the Industrial Internet of Things. In: 11th International Conference on System Safety and Cyber Security (SSCS 2016), London, UK, 11-13 Oct 2016,

Johnson, C., Shreeve, M., Sirko, P., Delain, O., Ruhlmann, O., Vautier, E., Graham, B. and Meloni, M.-T. (2016) Defending European Airports: Cyber-Physical Threat Analysis in Total Airport Management. In: 11th International Conference on System Safety and Cyber Security (SSCS 2016), London, UK, 11-13 Oct 2016,

Johnson, C. W. (2016) Role of Regulators in Safeguarding the Interface between Autonomous Systems and the General Public. In: 34th International System Safety Conference, Orlanda, FL, USA, 8-12 Aug 2016,

Johnson, C. W. (2016) You Outsource the Service but Not the Risk: Supply Chain Risk Management for the Cyber Security of Safety Critical Systems. In: 34th International System Safety Conference, Orlanda, FL, USA, 8-12 Aug 2016,

Johnson, C. W., Harkness, R. and Evangelopoulou, M. (2016) Forensic Attacks Analysis and the Cyber Security of Safety-Critical Industrial Control Systems. In: 34th International System Safety Conference, Orlanda, FL, USA, 8-12 Aug 2016,

Johnson, C. W. (2016) Why We Cannot (Yet) Ensure the Cybersecurity of Safety-Critical Systems. In: 24th Safety-Critical Systyems Symposium, Brighton, UK, 2-4 Feb 2016, pp. 171-182. ISBN 9781519420077

2015

Lu, Y., Peng, Z., Miller, A. A. , Zhao, T. and Johnson, C. W. (2015) How reliable is satellite navigation for aviation? Checking availability properties with probabilistic verification. Reliability Engineering and System Safety, 144, pp. 95-116. (doi:10.1016/j.ress.2015.07.020)

Gianfranco, E. and Johnson, C. W. (2015) Laypeoples' and experts' risk perception of cloud computing. International Journal on Cloud Computing Services and Architecture, 5(4/5), (doi:10.5121/ijccsa.2015.5401)

Evangelopoulou, M. and Johnson, C. (2015) Empirical framework for situation awareness measurement techniques in network defense. In: CyberSA 2015, London, 8-9 June 2015, (doi:10.1109/CyberSA.2015.7166132)

Gianfranco, E. and Johnson, C.W. (2015) Factors influencing risk acceptance of cloud computing services in the UK Government. International Journal on Cloud Computing Services and Architecture, 5(2/3),

Foreman, V. L., Favaró, F. M., Saleh, J. H. and Johnson, C. W. (2015) Software in military aviation and drone mishaps: analysis and recommendations for the investigation process. Reliability Engineering and System Safety, 137, pp. 101-111. (doi:10.1016/j.ress.2015.01.006)

He, Y., Johnson, C. and Lu, Y. (2015) Improving the exchange of lessons learned in security incident reports: case studies in the privacy of electronic patient records. Journal of Trust Management, 2, 1. (doi:10.1186/s40493-015-0016-2)

Johnson, C.W. (2015) Barriers to the Use of Intrusion Detection Systems in Safety-Critical Applications. In: 34th International Conference, Safecomp, Delft, The Netherlands, 23-25 Sep 2015, pp. 375-384. ISBN 9783319242545 (doi:10.1007/978-3-319-24255-2_27)

Johnson, C.W. (2015) Cyber Security and the Future of Air Traffic Management: Identifying the Challenges for NextGen and SESAR. In: 10th IET System Safety and Cyber Security Conference 2015, Bristol, England, 20-22 Oct 2015,

Johnson, C.W. (2015) Organisational, Political and Technical Barriers to the Integration of Safety and Cyber-Security Incident Reporting Systems. In: 34th International Conference, Safecomp, Delft, The Netherlands, 23-25 Sep 2015, pp. 400-409. ISBN 9783319242545 (doi:10.1007/978-3-319-24255-2_29)

Johnson, C.W. (2015) The Role of Cyber Insurance, Market Forces, Tort and Regulation in the Cyber-Security of Safety-Critical Industrie. In: 10th IET System Safety and Cyber Security Conference 2015, Bristol, England, 20-22 Oct 2015,

Johnson, C. W. (2015) Contrasting Approaches to Incident Reporting in the Development of Safety and Security-Critical Software. In: SAFECOMP 2015, Delft, The Netherlands, 22-25 Sept 2015, (Unpublished)

Landine, G., Glantz, C., O'Neil, L.R., Leneaus, J., Johnson, C.W., Lewis, J., Rodger, R., Bryant, J. and Leitch, R. (2015) Enhancing Information Security Management Systems for {CBRN} Facilities. In: IAEA International Conference on Computer Security in a Nuclear World, Vienna, Austria, 1-5 Jun 2015,

Lu, Y., Miller, A. , Johnson, C., Peng, Z. and Zhao, T. (2015) Availability analysis of satellite positioning systems for aviation using the prism model checker. In: 17th IEEE International Conference on Computational Science and Engineering (CSE 2014), Chengdu, China, 19-21 Dec 2014, pp. 704-713. (doi:10.1109/CSE.2014.148)

Prouzeau, A. and Johnson, C.W. (2015) Simulating the Risks From Aircraft Debris to the Public on the Ground. In: 5th International Conference on the Application and Theory of Automaiton in Command and Control Systems (ATACCS'2015), Toulouse, France, 30 Sep - 2 Oct 2015,

2014

White, K., Pezaros, D. and Johnson, C. (2014) Using programmable data networks to detect critical infrastructure challenges. In: 9th International Conference on Critical Information Infrastructures Security (CRITIS'14), Limassol, Cyprus, 13-15 Oct 2014,

Johnson, C. W. (2014) Economic recession and a crisis of regulation in safety–critical industries. Safety Science, 68, pp. 153-160. (doi:10.1016/j.ssci.2014.03.008)

Lu, Y., Peng, Z., Miller, A. , Zhao, T. and Johnson, C. (2014) Timed Fault Tree Models of the China Yongwen Railway Accident. In: 8th Asia Modelling Symposium (AMS 2014), Taipei, Taiwan, 23-25 Sep 2014, pp. 128-133. ISBN 9781479964864 (doi:10.1109/AMS.2014.34)

Evangelopoulou, M. and Johnson, C. W. (2014) Implementation of Safety Techniques in a Cyber Domain. SIN 2014: 7th International Conference on Security of Information and Networks, Glasgow, UK, 09-11 Sep 2014. pp. 261-263. ISBN 9781450330336 (doi:10.1145/2659651.2659740)

He, Y., Johnson, C., Lu, Y. and Lin, Y. (2014) Improving the information security management: an industrial study in the privacy of electronic patient records. In: 2014 IEEE 27th International Symposium on Computer-Based Medical Systems (CBMS), New York, NY, 27-29 May 2014, pp. 525-526. (doi:10.1109/CBMS.2014.121)

White, K. J. S., Pezaros, D. P. and Johnson, C. W. (2014) Principles for increased resilience in critical networked infrastructures. In: 6th International Conference on Research in Air Transportation (ICRAT 2014), Istanbul, Turkey, 26/30 May 2014,

He, Y., Johnson, C., Renaud, K., Lu, Y. and Jebriel, S. (2014) An empirical study on the use of the Generic Security Template for structuring the lessons from information security incidents. In: 6th International Conference on Computer Science and Information Technology (CSIT 2014), Amman, Jordan, 26-27 Mar 2014, pp. 178-188. (doi:10.1109/CSIT.2014.6805998)

Evangelopoulou, M. and Johnson, C.W. (2014) Attack visualisation for cyber-security situation awareness. In: 9th IET International Conference on System Safety and Cyber Security, Manchester, England, 15-16 Oct 2014, pp. 1-6. ISBN 9781849199407

He, Y., Johnson, C., Evangelopoulou, M. and Lin, Z. (2014) Diagraming approach to structure the security lessons: evaluation using cognitive dimensions. Lecture Notes in Computer Science, 8564, pp. 216-217. (doi:10.1007/978-3-319-08593-7_19)

He, Y., Johnson, C., Lu, Y. and Ahmad, A. (2014) Improving the exchange of lessons learned in security incident reports: case studies in the privacy of electronic patient records. IFIP Advances in Information and Communication Technology, 430, pp. 109-124. (doi:10.1007/978-3-662-43813-8_8)

Johnson, C. W. (2014) Anti-social networking: crowdsourcing and the cyber defence of national critical infrastructures. Ergonomics, 57(3), pp. 1-15. (doi:10.1080/00140139.2013.812749)

2013

Peng, Z., Lu, Y., Miller, A. , Johnson, C. and Zhao, T. (2013) A probabilistic model checking approach to analysing reliability, availability, and maintainability of a single satellite system. In: 7th European Modelling Symposium (EMS2013), Manchester, England, 20-22 Nov 2013, pp. 611-616. (doi:10.1109/EMS.2013.102)

2012

He, Y. and Johnson, C. (2012) Generic security cases for information system security in healthcare systems. In: 7th IET International Conference on System Safety, Incorporating the Cyber Security Conference, Edinburgh, UK, 15-18 Oct 2012, pp. 1-6. (doi:10.1049/cp.2012.1507)

Raue, S., Johnson, C.W. and Storer, T. (2012) A social media audience sharing model for authorities to support effective crisis communication. In: System Safety 2012: The 7th IET Conference on Systems Safety and CyberSecurity, Edinburgh, UK, 15-18 Oct 2012,

White, K. .J.S., Pezaros, D. P. and Johnson, C. W. (2012) Increasing resilience of ATM networks using traffic monitoring and automated anomaly analysis. In: 2nd International Conference on Application and Theory of Automation in Command and Control Systems, Imperial College, London, 29-31 May 2012,

2011

Johnson, C.W. (2011) Identifying common problems in the acquisition and deployment of large-scale software projects in the US and UK healthcare systems. Safety Science, 49(5), pp. 735-745. (doi:10.1016/j.ssci.2010.12.003)

Johnson, C.W. (2011) Human error, interaction and the development of safety-critical systems. In: Boy, G.A. (ed.) The Handbook of Human-Machine Interaction: a human-centered design approach. Ashgate: Farnham, pp. 91-106. ISBN 9780754675808

Johnson, C.W. and Holloway, C.M. (2011) Safety arguments for next generation location aware computing. In: 5th IET International Conference on Systems Safety, Manchester, UK, 18-20 Oct 2010, (doi:10.1049/cp.2010.0813)

2010

Johnson, C. and Jeunemaitre, A. (2010) A response to the April 2010 Eyjafjallajokull volcano eruption. Discussion Paper. HEC Paris, Jouy en Josas, France.

Johnson, C.W. and Jeunemaitre, A. (2010) Future directions for contingency planning in European Air Traffic Management: a response to the April 2010 Eyjafjallajokull volcano eruption. In: 1st HEC Paris Workshop on Regulation; Emergency Regulation Under the Threat of Catastrophy - A Hard Look at the Volcanic Ash Crisis, Jouy en Josas, France, 10-11 Nov 2010,

Holloway, C.M. and Johnson, C.W. (2010) Epistemic questions and answers for software system safety. In: 28th International Systems Safety Conference, Minneapolis, USA, 30 Aug - 3 Sep 2010,

Johnson, C. (2010) Computational concerns in the integration of Unmanned Airborne Systems into controlled airspace. Lecture Notes in Computer Science, 6351, pp. 142-154. (doi:10.1007/978-3-642-15651-9_11)

Johnson, C. (2010) Software configuration management for safety related applications in space systems: extending the application of the USAF 8-Step method. In: International Asosciation for the Advancement of Space Safety Conference, Huntsville, Alabama, 19-21 May 2010,

Johnson, C., Herd, A. and Wolff, M. (2010) The application of resilience engineering to human space flight. In: International Association for the Advancement of Space Safety Conference, Huntsville, Alabama, 19-21 May 2010,

Johnson, C. and Yepez, A.A. (2010) Safety cases for global navigation satellite systems' Safety of Life (SoL) applications. In: International Asosciation for the Advancement of Space Safety Conference, Huntsville, Alabama, 19-21 May 2010,

Johnson, C.W. and Raue, S. (2010) On the safety implications of e-governance: assessing the hazards of enterprise information architectures in safety-critical applications. Lecture Notes in Computer Science, 6351, pp. 402-417. (doi:10.1007/978-3-642-15651-9_30)

Nilsen-Nygaard, L. and Johnson, C.W. (2010) The role of simulations in preparing for terrorism. In: 28th International Systems Safety Conference, Minneapolis, USA, 30 Aug - 3 Sep 2010,

Raue, S. and Johnson, C.W. (2010) Using Web Service Architectures and Advanced Simulation Tools to ensure that cost savings in strategic funding for Emergency Services do not jeopardize the safety of local communities. In: 28th International Systems Safety Conference, Minneapolis, USA, 30 Aug - 3 Sep 2010,

2009

Johnson, C.W., Kirwan, B., Licu, A. and Stastny, P. (2009) Recognition primed decision making and the organisational response to accidents: Überlingen and the challenges of safety improvement in European air traffic management. Safety Science, 47(6), pp. 853-872. (doi:10.1016/j.ssci.2008.10.013)

Fletcher, L.L., Kaiser, J.M., Johnson, C.W. and Shea, C. (2009) Configuration management: a critical analysis of applications using the 8-Step problem solving method. In: 27th International Conference on Systems Safety, Huntsville, Alabama, USA, 3-7 Aug 2009, pp. 2807-2817.

Holloway, C.M. and Johnson, C.W. (2009) Towards a comprehensive consideration of epistemic questions in software system safety. In: Casely, P. and Johnson, C.W. (eds.) 4th IET International Conference on Systems Safety 2009. Incorporating the SaRS Annual Conference. IET Conference Publications, 3A1. ISBN 9781849191951 (doi:10.1049/cp.2009.1546)

Johnson, C. (2009) Socio-technical approaches to risk assessment in national critical infrastructures. Risk Management, 11(3-4), pp. 155-159. (doi:10.1057/rm.2009.9)

Johnson, C., Kirwan, B. and Licu, T. (2009) The interaction between safety culture and degraded modes: a survey of national infrastructures for air traffic management. Risk Management, 11(3-4), pp. 241-284. (doi:10.1057/rm.2009.10)

Johnson, C.W. (2009) Complexity, structured chaos and the importance of Information Management for Mobile Computing in the UK floods of 2007. Lecture Notes in Computer Science, 5424, pp. 1-11. (doi:10.1007/978-3-642-00440-7_1)

Johnson, C.W. (2009) Degraded modes and the 'culture of coping' in military operations: an analysis of a fatal incident on-board HMS Tireless on 20/21 March 2007. In: US Joint Weapons Systems Safety Conference 2009, Huntsville, Alabama, USA, 2009, pp. 3511-3521.

Johnson, C.W. (2009) Insights from the Nogales Predator crash for the integration of UAVs into the National Airspace System under FAA interim operational guidance 08-01. In: 27th International Conference on Systems Safety, Huntsville, Alabama, USA, 3-7 Aug 2009, pp. 3066-3076.

Johnson, C.W. (2009) Interactions between brown-out accidents and night vision equipment in military aviation accidents. In: US Joint Weapons Systems Safety Conference 2009, Huntsville, Alabama, USA, 2009, pp. 3508-3518.

Johnson, C.W. (2009) Interactions between night vision and brownout accidents: the loss of a UK RAF Puma helicopter on operational duty in Iraq, November 2007. In: Livingston, J.M., Barnes, R., Swallom, D. and Pottraz, W. (eds.) Proceedings of the US Joint Weapons Systems Safety Conference 2009, Huntsville, Alabama. UNSPECIFIED, pp. 3509-3519.

Johnson, C.W. (2009) Politics and patient safety don't mix: understanding the failure of large-scale software procurement in healthcare. In: Casely, P. and Johnson, C.W. (eds.) Proceedings of the 4th IET International Conference on Systems Safety 2009. Incorporating the SaRS Annual Conference. IET Conference Publications, 3A3. ISBN 9781849191951 (doi:10.1049/cp.2009.1548)

Johnson, C.W. (2009) The dangers of interaction with modular and self-healing avionics applications: redundancy considered harmful. In: 27th International Conference on Systems Safety, Huntsville, Alabama, USA, 3-7 Aug 2009, pp. 3044-3054.

Johnson, C.W. (2009) The safety research challenges for the Air Traffic Management Of Unmanned Aerial Systems (UAS). In: 6th EUROCONTROL Experimental Centre Safety Research and Development Workshop, Munich, Germany, 21-22 Oct 2009,

Johnson, C.W., Fletcher, L.L., Holloway, C.M. and Shea, C. (2009) Configuration Management as a common factor in space related mishaps. In: 27th International Conference on Systems Safety, Huntsville, Alabama, USA, 3-7 Aug 2009, pp. 3047-3057.

Johnson, C.W. and Nilsen-Nygaard, L. (2009) A 'systemic approach' for countering the threat to public safety from Improvised Explosive Devices (IEDs). In: 27th Internatinal Conference on Systems Safety, Huntsville, Alabama, USA, 3-7 Aug 2009, pp. 3048-3058.

Nilsen-Nygaard, L. and Johnson, C.W. (2009) On the validation of counter-IED simulations. In: 27th Internatinal Conference on Systems Safety, Huntsville, Alabama, USA, 3-7 Aug 2009, pp. 3075-3085.

2008

Johnson, C.W. (2008) Modelling the role of software in the propagation of failure across National Critical Infrastructures. ERCIM News, 75, pp. 23-25.

Johnson, C.W. (2008) Operational experience and research directions in military night vision equipment. Defence Management Journal, 42, pp. 110-114.

Johnson, C.W. (2008) Ten contentions of corporate manslaughter legislation: public policy and the legal response to workplace accidents. Safety Science, 46(3), pp. 349-370. (doi:10.1016/j.ssci.2007.05.011)

Johnson, C.W. (2008) Using evacuation simulations for contingency planning to enhance the security and safety of the 2012 olympic venues. Safety Science, 46(2), pp. 302-322. (doi:10.1016/j.ssci.2007.05.008)

Johnson, C.W. and de Almeida, I.M. (2008) An investigation into the loss of the Brazilian space programme’s launch vehicle VLS-1 V03. Safety Science, 46(1), pp. 38-53. (doi:10.1016/j.ssci.2006.05.007)

Holloway, C.M. and Johnson, C.W. (2008) How past loss of control accidents may inform safety cases for Advanced Control Systems on commercial aircraft. In: Third IET Systems Safety Conference, NEC, Birmingham, UK, 2008, Birmingham, UK, 20-22 October 2008,

Johnson, C.W. (2008) 'Act in haste, repent at leisure': an overview of operational incidents involving UAVs in Afghanistan (2003-2005). In: 3rd IET International Conference on System Safety 2008. Institution of Engineering and Technology, 3C1. ISBN 9780863419706 (doi:10.1049/cp:20080720)

Johnson, C.W. (2008) 'Act in haste, repent at leisure’: an overview of operational incidents involving UAVs in Afghanistan. In: Third IET Systems Safety Conference, NEC, Birmingham, UK, 2008, Birmingham, UK, 20-22 October 2008,

Johnson, C.W. (2008) Have we learned enough from Ueberlingen? The challenges of safety improvement in European Air Traffic Management. In: EUROCONTROL Annual Safety R&D Seminar, Southampton, UK, 22-24 Oct 2008,

Johnson, C.W. (2008) The Hidden Human Factors in Unmanned Aerial Vehicles. In: Proceedings of the 2007 International Systems Safety Society Conference, Baltimore, 2007,

Johnson, C.W. (2008) Military risk assessment in counter insurgency operations: a Case Study in the retrieval of a UAV Nr Sangin, Helmand Province, Afghanistan, 11th June 2006. In: Third IET Systems Safety Conference, NEC, Birmingham, UK, 2008, Birmingham, UK, 20-22 October 2008,

Johnson, C.W. (2008) On the convergence of physical and digital security for public safety at Olympic events. In: Simmons, R.J., Mohan, D.J. and Mullane, M. (eds.) Proceedings of the 26th International Conference on System Safety. International System Safety Society. ISBN 0972138587

Johnson, C.W. (2008) Understanding failures in international safety-critical infrastructures: a comparison of European and North American power failures. In: 26th International Conference on Systems Safety, Vancouver, Canada, 25-29 Aug 2008,

Johnson, C.W., Amar, G., Licu, T. and Lawrence, R. (2008) High-level architectures for contingency planning in Air Traffic Management. In: Simmons, R.J., Mohan, D.J. and Mullane, M. (eds.) Proceedings of the 26th International Conference on System Safety. International System Safety Society. ISBN 0972138587

Johnson, C.W. and McLean, K. (2008) Tools for local critical infrastructure protection. In: Third IET Systems Safety Conference, NEC, Birmingham, UK, 2008, Birmingham, UK, 20-22 October 2008, pp. 1-6.

Johnson, C.W. and Nilsen-Nygaard, L. (2008) Extending the use of evacuation simulators to support counter terrorism: using models of human behaviour to coordinate emergency responses to Improvised Explosive Devices. In: 26th International System Safety Conference ISSC 08, Vancouver, British Columbia, Canada, 25-29 Aug 2008, ISBN 0972138587

Johnson, C.W., Shea, C. and Holloway, C.M. (2008) The Role of Trust and Interaction in GPS Related Accidents: A Human Factors Safety Assessment of the Global Positioning System (GPS). In: 26th Annual Conference of the International Systems Safety Society, Vancouver, Canada, August 25-29 2008,

Johnson, C.W. and Williams, R. (2008) Computational support for identifying safety and security interdependencies between National Critical Infrastructures. In: Third IET Systems Safety Conference, NEC, Birmingham, UK, 2008, Birmingham, UK, 20-22 October 2008,

Nilsen-Nygaard, L. and Johnson, C.W. (2008) Using mathematical models to guide the simuation of Improvised Explosive Devices in public spaces. In: Third IET Systems Safety Conference, NEC, Birmingham, UK, 2008, Birmingham, UK, 20-22 October 2008,

Whiteley, I., Bogatyreva, O., Johnson, C.W., Wolff, M. and Townend, M. (2008) Human missions to Mars: designing decision-support tools for a safety critical environment. In: 3rd IAASS Conference, Rome, Italy, 21-23 Oct 2008,

Whiteley, I., Bogatyreva, O., Johnson, C.W., Wolff, M. and Townend, M. (2008) A structured approach to scenario generation for the design of crew decision support tools. In: 3rd IAASS Conference, Rome, Italy, 21-23 Oct 2008,

2007

Johnson, C. (2007) Public Policy and the Failure of National Infrastructures. International Journal of Emergency Management, 1(4), pp. 18-32.

Johnson, C. (2007) Human factors of reporting systems. In: Carayon, P. (ed.) Handbook of human factors and ergonomics in health care and patient safety. Series: Human factors and ergonomics. Lawrence Erlbaum Associates: Mahwah, N.J., pp. 715-750. ISBN 9780805848854

Johnson, C. (2007) A look at aircraft accident investigation in the early days: do early 20th century accident investgation techniques have any lessons for today? In: 2nd Institution of Engineering and Technology International Conference on System Safety 2007, Savoy Place, London, 22-24 October 2007, pp. 235-240.

Johnson, C. (2007) The systemic effects of fatigue on military operations. In: 2nd IET International Conference on System Safety 2007, London, 22-24 October, 2007, pp. 1-6. (doi:10.1049/cp:20070432)

Johnson, C. and Holloway, C.M. (2007) A historical perspective on aviation accident investigation. In: 2nd Institution of Engineering and Technology International Conference on System Safety 2007, Savoy Place, London, 22-24 October 2007,

2006

Basnyat, S., Chozos, N., Johnson, C. and Palanque, P. (2006) Incident and accident investigation techniques to inform model-based design of safety-critical interactive systems. Interactive Systems, 3941, pp. 51-66.

Johnson, C. (2006) Thinking the Unthinkable: Exposing the Vulernabilities in the NHS Response to Coordinated Terrorist Actions. Health Care Risk Report, 12(5),

Johnson, C. (2006) Why Did That Happen? Exploring the Proliferation of Barely Usable Software in Healthcare Systems. BMJ Journal of Quality and Safety in Healthcare, 15, pp. 76-81.

Johnson, C. and Rankin, M. (2006) Record professionals in a multi-media age: turning lead into gold? In: Tough, A. and Moss, M. (eds.) Record Keeping in a Hybrid Environment: Managing the Creation, Use, Preservation and Disposal of Unique Information Objects in Context. Series: Chandos information professional series. Chandos: Oxford. ISBN 9781843341864

2005

Johnson, C.W. (2005) Lessons from the evacuation of the World Trade Center, Sept 11th 2001 for the future development of computer simulations. Cognition, Technology and Work, 7(4), pp. 214-240. (doi:10.1007/s10111-005-0009-5)

Johnson, C.W. (2005) The natural history of bugs: using formal methods to analyse software related failures in space missions. Lecture Notes in Computer Science, 3582, pp. 9-25. (doi:10.1007/11526841_3)

Johnson, C. (2005) Proceedings of the Second Workshop on Complexity in Design and Engineering. In: 2nd Workshop on Complexity in Design and Engineering, Glasgow, Scotland, 10-12 March, 2005,

Johnson, C.W. (2005) Applying the lessons of the attack on the World Trade Center, 11th September 2001, to the design and use of interactive evacuation simulations. In: Conference on Human Factors in Computing Systems, Portland, Oregon, 2-7 April 2005, pp. 651-660. ISBN 1-58113-998-5 (doi:10.1145/1054972.1055062)

2004

Johnson, C. (2004) Communication Breakdown Between the Suppliers and Users of Clinical Devices. Biomedical Instrumentation and Technology Journal, pp. 54-78.

Johnson, C. (2004) A Note on Two Causal Analysis Techniques for Electrical, Electronic or Programmable Electronic Systems. In Icheme: Loss Prevention Bulletin, pp. 16-29.

2003

Johnson, C. (2003) A Survey of Causation in Mishap Logics. Reliability Engineering and System Safety Journal, pp. 271-291.

Johnson, C. and Holloway, C. (2003) A survey of logic formalisms to support mishap analysis. Reliability Engineering and System Safety, 80, pp. 271-291. (doi:10.1016/S0951-8320(03)00053-X)

Johnson, C. (2003) How Will We Get the Data and What Will We Do With It? Issues in the Reporting of Adverse Healthcare Events. BMJ Quality and Safety in Healthcare, pp. 64-67.

Johnson, C. (2003) Is there a public face to e-democracy? In: Remenyi, D. and Bannister, F. (eds.) 3rd European Conference on E-Government, Trinity College, Dublin, Ireland, 3-4 July, 2003. MCIL: Reading, UK, pp. 233-240. ISBN 9780954457716

Johnson, C. (2003) Using IEC 61508 to guide the investigation of computer-related incidents and accidents. Computer Safety, Reliability, and Security Proceedings, 2788, pp. 410-423.

Johnson, C. (2003) The application of causal analysis techniques for computer-related mishaps. Computer Safety, Reliability, and Security Proceedings, 2788, pp. 368-381.

Johnson, C.W. and Holloway, C.M. (2003) The ESA/NASA SOHO mission interruption: using the STAMP accident analysis technique for a software related 'mishap'. Software: Practice and Experience, 33, pp. 1177-1198. (doi:10.1002/spe.544)

Johnson, C. (2003) How will we get the data and what will we do with it then? Issues in the reporting of adverse healthcare events. Quality and Safety in Health Care, 12, II64-II67.

2002

Johnson, C. (2002) Forensic software engineering: are software failures symptomatic of systemic problems? Safety Science, 40, pp. 835-847.

Johnson, C. (2002) Software tools to support incident reporting in safety-critical systems. Safety Science, 40, pp. 765-780.

Johnson, C. (2002) Novel Visualisation Techniques for the Presentation of Accident Reports. Documentation. University of Glasgow, Glasgow.

Johnson, C. (2002) The use of a formalised risk model in NHS information systems development. Cognition, Technology and Work, 4, pp. 120-136.

Sage, M. and Johnson, C. (2002) Formally verified, rapid prototyping for air traffic control. Reliability Engineering and System Safety, 75, pp. 121-132.

2001

Johnson, C. (Ed.) (2001) Interactive Systems: Design, Specification, and Verification. Series: Lecture notes in computer science. Springer: Berlin. ISBN 9783540428077

Johnson, C. (2001) The London Ambulance Service, Computer Aided Despatch System: A Case Study in the Integration of Accident Reports and the Constructive Design of Safety-Critical Computer Systems. Reliability Engineering and Systems Safety, 71(3), pp. 311-326.

Johnson, C. (2001) Questioning the foundations of utility for Quality of Service in interface development. Interactive Systems, 1946, pp. 19-33.

Johnson, C. (2001) A case study in the integration of accident reports and constructive design documents. Reliability Engineering and System Safety, 71, pp. 311-326.

Johnson, C. (2001) Models and the use of Counter-Factual Reasoning in AccidentInvestigations. Technical Report. University of Glasgow, Glasgow.

Randell, R., Wright, D. and Johnson, C. (2001) Achieving a Balance of Visibility for Dependable Intensive Care Equipment. In: Procter, R. and Rouncefield, M. (eds.) Proceedings of Workshop on Dependability in Healthcare Informatics. Lancaster University: Lancaster. ISBN 9781862201095

This list was generated on Sat Nov 18 15:07:12 2017 GMT.
Number of items: 127.

Articles

Vuorio, A., Stoop, J. and Johnson, C. (2017) The need to establish consistent international safety investigation guidelines for the chemical industries. Safety Science, 95, pp. 62-74. (doi:10.1016/j.ssci.2017.02.003)

He, Y. and Johnson, C. (2017) Challenges of information security incident learning: an industrial case study in a Chinese healthcare organization. Informatics for Health and Social Care, 42(4), pp. 393-408. (doi:10.1080/17538157.2016.1255629) (PMID:28068150)

Lu, Y., Miller, A. A. , Hoffmann, R. and Johnson, C. W. (2016) Towards the automated verification of Weibull distributions for system failure rates. Lecture Notes in Computer Science, 9933, pp. 81-96. (doi:10.1007/978-3-319-45943-1_6)

Sujan, M. A., Habli, I., Kelly, T. P., Pozzi, S. and Johnson, C. W. (2016) Should healthcare providers do safety cases? Lessons from a cross-industry review of safety case practices. Safety Science, 84, pp. 181-189. (doi:10.1016/j.ssci.2015.12.021)

Peng, Z., Lu, Y., Miller, A. , Tingdi, Z. and Johnson, C. (2016) Formal specification and quantitative analysis of a constellation of navigation satellites. Quality and Reliability Engineering International, 32(2), pp. 345-361. (doi:10.1002/qre.1754)

Peng, Z., Lu, Y., Miller, A. , Johnson, C. and Zhao, T. (2016) Risk assessment of railway transportation systems using timed fault trees. Quality and Reliability Engineering International, 32(1), pp. 181-194. (doi:10.1002/qre.1738)

Lu, Y., Peng, Z., Miller, A. A. , Zhao, T. and Johnson, C. W. (2015) How reliable is satellite navigation for aviation? Checking availability properties with probabilistic verification. Reliability Engineering and System Safety, 144, pp. 95-116. (doi:10.1016/j.ress.2015.07.020)

Gianfranco, E. and Johnson, C. W. (2015) Laypeoples' and experts' risk perception of cloud computing. International Journal on Cloud Computing Services and Architecture, 5(4/5), (doi:10.5121/ijccsa.2015.5401)

Gianfranco, E. and Johnson, C.W. (2015) Factors influencing risk acceptance of cloud computing services in the UK Government. International Journal on Cloud Computing Services and Architecture, 5(2/3),

Foreman, V. L., Favaró, F. M., Saleh, J. H. and Johnson, C. W. (2015) Software in military aviation and drone mishaps: analysis and recommendations for the investigation process. Reliability Engineering and System Safety, 137, pp. 101-111. (doi:10.1016/j.ress.2015.01.006)

He, Y., Johnson, C. and Lu, Y. (2015) Improving the exchange of lessons learned in security incident reports: case studies in the privacy of electronic patient records. Journal of Trust Management, 2, 1. (doi:10.1186/s40493-015-0016-2)

Johnson, C. W. (2014) Economic recession and a crisis of regulation in safety–critical industries. Safety Science, 68, pp. 153-160. (doi:10.1016/j.ssci.2014.03.008)

He, Y., Johnson, C., Evangelopoulou, M. and Lin, Z. (2014) Diagraming approach to structure the security lessons: evaluation using cognitive dimensions. Lecture Notes in Computer Science, 8564, pp. 216-217. (doi:10.1007/978-3-319-08593-7_19)

He, Y., Johnson, C., Lu, Y. and Ahmad, A. (2014) Improving the exchange of lessons learned in security incident reports: case studies in the privacy of electronic patient records. IFIP Advances in Information and Communication Technology, 430, pp. 109-124. (doi:10.1007/978-3-662-43813-8_8)

Johnson, C. W. (2014) Anti-social networking: crowdsourcing and the cyber defence of national critical infrastructures. Ergonomics, 57(3), pp. 1-15. (doi:10.1080/00140139.2013.812749)

Johnson, C.W. (2011) Identifying common problems in the acquisition and deployment of large-scale software projects in the US and UK healthcare systems. Safety Science, 49(5), pp. 735-745. (doi:10.1016/j.ssci.2010.12.003)

Johnson, C. (2010) Computational concerns in the integration of Unmanned Airborne Systems into controlled airspace. Lecture Notes in Computer Science, 6351, pp. 142-154. (doi:10.1007/978-3-642-15651-9_11)

Johnson, C.W. and Raue, S. (2010) On the safety implications of e-governance: assessing the hazards of enterprise information architectures in safety-critical applications. Lecture Notes in Computer Science, 6351, pp. 402-417. (doi:10.1007/978-3-642-15651-9_30)

Johnson, C.W., Kirwan, B., Licu, A. and Stastny, P. (2009) Recognition primed decision making and the organisational response to accidents: Überlingen and the challenges of safety improvement in European air traffic management. Safety Science, 47(6), pp. 853-872. (doi:10.1016/j.ssci.2008.10.013)

Johnson, C. (2009) Socio-technical approaches to risk assessment in national critical infrastructures. Risk Management, 11(3-4), pp. 155-159. (doi:10.1057/rm.2009.9)

Johnson, C., Kirwan, B. and Licu, T. (2009) The interaction between safety culture and degraded modes: a survey of national infrastructures for air traffic management. Risk Management, 11(3-4), pp. 241-284. (doi:10.1057/rm.2009.10)

Johnson, C.W. (2009) Complexity, structured chaos and the importance of Information Management for Mobile Computing in the UK floods of 2007. Lecture Notes in Computer Science, 5424, pp. 1-11. (doi:10.1007/978-3-642-00440-7_1)

Johnson, C.W. (2008) Modelling the role of software in the propagation of failure across National Critical Infrastructures. ERCIM News, 75, pp. 23-25.

Johnson, C.W. (2008) Operational experience and research directions in military night vision equipment. Defence Management Journal, 42, pp. 110-114.

Johnson, C.W. (2008) Ten contentions of corporate manslaughter legislation: public policy and the legal response to workplace accidents. Safety Science, 46(3), pp. 349-370. (doi:10.1016/j.ssci.2007.05.011)

Johnson, C.W. (2008) Using evacuation simulations for contingency planning to enhance the security and safety of the 2012 olympic venues. Safety Science, 46(2), pp. 302-322. (doi:10.1016/j.ssci.2007.05.008)

Johnson, C.W. and de Almeida, I.M. (2008) An investigation into the loss of the Brazilian space programme’s launch vehicle VLS-1 V03. Safety Science, 46(1), pp. 38-53. (doi:10.1016/j.ssci.2006.05.007)

Johnson, C. (2007) Public Policy and the Failure of National Infrastructures. International Journal of Emergency Management, 1(4), pp. 18-32.

Basnyat, S., Chozos, N., Johnson, C. and Palanque, P. (2006) Incident and accident investigation techniques to inform model-based design of safety-critical interactive systems. Interactive Systems, 3941, pp. 51-66.

Johnson, C. (2006) Thinking the Unthinkable: Exposing the Vulernabilities in the NHS Response to Coordinated Terrorist Actions. Health Care Risk Report, 12(5),

Johnson, C. (2006) Why Did That Happen? Exploring the Proliferation of Barely Usable Software in Healthcare Systems. BMJ Journal of Quality and Safety in Healthcare, 15, pp. 76-81.

Johnson, C.W. (2005) Lessons from the evacuation of the World Trade Center, Sept 11th 2001 for the future development of computer simulations. Cognition, Technology and Work, 7(4), pp. 214-240. (doi:10.1007/s10111-005-0009-5)

Johnson, C.W. (2005) The natural history of bugs: using formal methods to analyse software related failures in space missions. Lecture Notes in Computer Science, 3582, pp. 9-25. (doi:10.1007/11526841_3)

Johnson, C. (2004) Communication Breakdown Between the Suppliers and Users of Clinical Devices. Biomedical Instrumentation and Technology Journal, pp. 54-78.

Johnson, C. (2004) A Note on Two Causal Analysis Techniques for Electrical, Electronic or Programmable Electronic Systems. In Icheme: Loss Prevention Bulletin, pp. 16-29.

Johnson, C. (2003) A Survey of Causation in Mishap Logics. Reliability Engineering and System Safety Journal, pp. 271-291.

Johnson, C. and Holloway, C. (2003) A survey of logic formalisms to support mishap analysis. Reliability Engineering and System Safety, 80, pp. 271-291. (doi:10.1016/S0951-8320(03)00053-X)

Johnson, C. (2003) How Will We Get the Data and What Will We Do With It? Issues in the Reporting of Adverse Healthcare Events. BMJ Quality and Safety in Healthcare, pp. 64-67.

Johnson, C. (2003) Using IEC 61508 to guide the investigation of computer-related incidents and accidents. Computer Safety, Reliability, and Security Proceedings, 2788, pp. 410-423.

Johnson, C. (2003) The application of causal analysis techniques for computer-related mishaps. Computer Safety, Reliability, and Security Proceedings, 2788, pp. 368-381.

Johnson, C.W. and Holloway, C.M. (2003) The ESA/NASA SOHO mission interruption: using the STAMP accident analysis technique for a software related 'mishap'. Software: Practice and Experience, 33, pp. 1177-1198. (doi:10.1002/spe.544)

Johnson, C. (2003) How will we get the data and what will we do with it then? Issues in the reporting of adverse healthcare events. Quality and Safety in Health Care, 12, II64-II67.

Johnson, C. (2002) Forensic software engineering: are software failures symptomatic of systemic problems? Safety Science, 40, pp. 835-847.

Johnson, C. (2002) Software tools to support incident reporting in safety-critical systems. Safety Science, 40, pp. 765-780.

Johnson, C. (2002) The use of a formalised risk model in NHS information systems development. Cognition, Technology and Work, 4, pp. 120-136.

Sage, M. and Johnson, C. (2002) Formally verified, rapid prototyping for air traffic control. Reliability Engineering and System Safety, 75, pp. 121-132.

Johnson, C. (2001) The London Ambulance Service, Computer Aided Despatch System: A Case Study in the Integration of Accident Reports and the Constructive Design of Safety-Critical Computer Systems. Reliability Engineering and Systems Safety, 71(3), pp. 311-326.

Johnson, C. (2001) Questioning the foundations of utility for Quality of Service in interface development. Interactive Systems, 1946, pp. 19-33.

Johnson, C. (2001) A case study in the integration of accident reports and constructive design documents. Reliability Engineering and System Safety, 71, pp. 311-326.

Book Sections

Johnson, C.W. (2011) Human error, interaction and the development of safety-critical systems. In: Boy, G.A. (ed.) The Handbook of Human-Machine Interaction: a human-centered design approach. Ashgate: Farnham, pp. 91-106. ISBN 9780754675808

Holloway, C.M. and Johnson, C.W. (2009) Towards a comprehensive consideration of epistemic questions in software system safety. In: Casely, P. and Johnson, C.W. (eds.) 4th IET International Conference on Systems Safety 2009. Incorporating the SaRS Annual Conference. IET Conference Publications, 3A1. ISBN 9781849191951 (doi:10.1049/cp.2009.1546)

Johnson, C.W. (2009) Interactions between night vision and brownout accidents: the loss of a UK RAF Puma helicopter on operational duty in Iraq, November 2007. In: Livingston, J.M., Barnes, R., Swallom, D. and Pottraz, W. (eds.) Proceedings of the US Joint Weapons Systems Safety Conference 2009, Huntsville, Alabama. UNSPECIFIED, pp. 3509-3519.

Johnson, C.W. (2009) Politics and patient safety don't mix: understanding the failure of large-scale software procurement in healthcare. In: Casely, P. and Johnson, C.W. (eds.) Proceedings of the 4th IET International Conference on Systems Safety 2009. Incorporating the SaRS Annual Conference. IET Conference Publications, 3A3. ISBN 9781849191951 (doi:10.1049/cp.2009.1548)

Johnson, C.W. (2008) 'Act in haste, repent at leisure': an overview of operational incidents involving UAVs in Afghanistan (2003-2005). In: 3rd IET International Conference on System Safety 2008. Institution of Engineering and Technology, 3C1. ISBN 9780863419706 (doi:10.1049/cp:20080720)

Johnson, C.W. (2008) On the convergence of physical and digital security for public safety at Olympic events. In: Simmons, R.J., Mohan, D.J. and Mullane, M. (eds.) Proceedings of the 26th International Conference on System Safety. International System Safety Society. ISBN 0972138587

Johnson, C.W., Amar, G., Licu, T. and Lawrence, R. (2008) High-level architectures for contingency planning in Air Traffic Management. In: Simmons, R.J., Mohan, D.J. and Mullane, M. (eds.) Proceedings of the 26th International Conference on System Safety. International System Safety Society. ISBN 0972138587

Johnson, C. (2007) Human factors of reporting systems. In: Carayon, P. (ed.) Handbook of human factors and ergonomics in health care and patient safety. Series: Human factors and ergonomics. Lawrence Erlbaum Associates: Mahwah, N.J., pp. 715-750. ISBN 9780805848854

Johnson, C. and Rankin, M. (2006) Record professionals in a multi-media age: turning lead into gold? In: Tough, A. and Moss, M. (eds.) Record Keeping in a Hybrid Environment: Managing the Creation, Use, Preservation and Disposal of Unique Information Objects in Context. Series: Chandos information professional series. Chandos: Oxford. ISBN 9781843341864

Johnson, C. (2003) Is there a public face to e-democracy? In: Remenyi, D. and Bannister, F. (eds.) 3rd European Conference on E-Government, Trinity College, Dublin, Ireland, 3-4 July, 2003. MCIL: Reading, UK, pp. 233-240. ISBN 9780954457716

Randell, R., Wright, D. and Johnson, C. (2001) Achieving a Balance of Visibility for Dependable Intensive Care Equipment. In: Procter, R. and Rouncefield, M. (eds.) Proceedings of Workshop on Dependability in Healthcare Informatics. Lancaster University: Lancaster. ISBN 9781862201095

Edited Books

Johnson, C. (Ed.) (2001) Interactive Systems: Design, Specification, and Verification. Series: Lecture notes in computer science. Springer: Berlin. ISBN 9783540428077

Research Reports or Papers

Johnson, C. and Jeunemaitre, A. (2010) A response to the April 2010 Eyjafjallajokull volcano eruption. Discussion Paper. HEC Paris, Jouy en Josas, France.

Johnson, C. (2002) Novel Visualisation Techniques for the Presentation of Accident Reports. Documentation. University of Glasgow, Glasgow.

Johnson, C. (2001) Models and the use of Counter-Factual Reasoning in AccidentInvestigations. Technical Report. University of Glasgow, Glasgow.

Conference or Workshop Item

Johnson, C. W., Evangelopoulou, M. and Pavlova, T. (2017) Applying Lessons from Cyber Attacks on Ukrainian Infrastructures to Secure Gateways onto the Industrial Internet of Things. Proceedings 35th International System Safety Conference, Albuquerque, NM, USA, 21-25 Aug 2017.

Johnson, C. W., Saleem, M. H., Evangelopoulou, M., Cook, M., Harkness, R. and Barker, T. (2017) Defending Against Firmware Cyber Attacks on Safety-Critical Systems. Proceedings 35th International System Safety Conference, Albuquerque, NM, USA, 21-25 Aug 2017.

Evangelopoulou, M. and Johnson, C. W. (2014) Implementation of Safety Techniques in a Cyber Domain. SIN 2014: 7th International Conference on Security of Information and Networks, Glasgow, UK, 09-11 Sep 2014. pp. 261-263. ISBN 9781450330336 (doi:10.1145/2659651.2659740)

Conference Proceedings

Johnson, C. (2016) Securing the Participation of Safety-Critical SCADA Systems in the Industrial Internet of Things. In: 11th International Conference on System Safety and Cyber Security (SSCS 2016), London, UK, 11-13 Oct 2016,

Johnson, C., Shreeve, M., Sirko, P., Delain, O., Ruhlmann, O., Vautier, E., Graham, B. and Meloni, M.-T. (2016) Defending European Airports: Cyber-Physical Threat Analysis in Total Airport Management. In: 11th International Conference on System Safety and Cyber Security (SSCS 2016), London, UK, 11-13 Oct 2016,

Johnson, C. W. (2016) Role of Regulators in Safeguarding the Interface between Autonomous Systems and the General Public. In: 34th International System Safety Conference, Orlanda, FL, USA, 8-12 Aug 2016,

Johnson, C. W. (2016) You Outsource the Service but Not the Risk: Supply Chain Risk Management for the Cyber Security of Safety Critical Systems. In: 34th International System Safety Conference, Orlanda, FL, USA, 8-12 Aug 2016,

Johnson, C. W., Harkness, R. and Evangelopoulou, M. (2016) Forensic Attacks Analysis and the Cyber Security of Safety-Critical Industrial Control Systems. In: 34th International System Safety Conference, Orlanda, FL, USA, 8-12 Aug 2016,

Johnson, C. W. (2016) Why We Cannot (Yet) Ensure the Cybersecurity of Safety-Critical Systems. In: 24th Safety-Critical Systyems Symposium, Brighton, UK, 2-4 Feb 2016, pp. 171-182. ISBN 9781519420077

Evangelopoulou, M. and Johnson, C. (2015) Empirical framework for situation awareness measurement techniques in network defense. In: CyberSA 2015, London, 8-9 June 2015, (doi:10.1109/CyberSA.2015.7166132)

Johnson, C.W. (2015) Barriers to the Use of Intrusion Detection Systems in Safety-Critical Applications. In: 34th International Conference, Safecomp, Delft, The Netherlands, 23-25 Sep 2015, pp. 375-384. ISBN 9783319242545 (doi:10.1007/978-3-319-24255-2_27)

Johnson, C.W. (2015) Cyber Security and the Future of Air Traffic Management: Identifying the Challenges for NextGen and SESAR. In: 10th IET System Safety and Cyber Security Conference 2015, Bristol, England, 20-22 Oct 2015,

Johnson, C.W. (2015) Organisational, Political and Technical Barriers to the Integration of Safety and Cyber-Security Incident Reporting Systems. In: 34th International Conference, Safecomp, Delft, The Netherlands, 23-25 Sep 2015, pp. 400-409. ISBN 9783319242545 (doi:10.1007/978-3-319-24255-2_29)

Johnson, C.W. (2015) The Role of Cyber Insurance, Market Forces, Tort and Regulation in the Cyber-Security of Safety-Critical Industrie. In: 10th IET System Safety and Cyber Security Conference 2015, Bristol, England, 20-22 Oct 2015,

Johnson, C. W. (2015) Contrasting Approaches to Incident Reporting in the Development of Safety and Security-Critical Software. In: SAFECOMP 2015, Delft, The Netherlands, 22-25 Sept 2015, (Unpublished)

Landine, G., Glantz, C., O'Neil, L.R., Leneaus, J., Johnson, C.W., Lewis, J., Rodger, R., Bryant, J. and Leitch, R. (2015) Enhancing Information Security Management Systems for {CBRN} Facilities. In: IAEA International Conference on Computer Security in a Nuclear World, Vienna, Austria, 1-5 Jun 2015,

Lu, Y., Miller, A. , Johnson, C., Peng, Z. and Zhao, T. (2015) Availability analysis of satellite positioning systems for aviation using the prism model checker. In: 17th IEEE International Conference on Computational Science and Engineering (CSE 2014), Chengdu, China, 19-21 Dec 2014, pp. 704-713. (doi:10.1109/CSE.2014.148)

Prouzeau, A. and Johnson, C.W. (2015) Simulating the Risks From Aircraft Debris to the Public on the Ground. In: 5th International Conference on the Application and Theory of Automaiton in Command and Control Systems (ATACCS'2015), Toulouse, France, 30 Sep - 2 Oct 2015,

White, K., Pezaros, D. and Johnson, C. (2014) Using programmable data networks to detect critical infrastructure challenges. In: 9th International Conference on Critical Information Infrastructures Security (CRITIS'14), Limassol, Cyprus, 13-15 Oct 2014,

Lu, Y., Peng, Z., Miller, A. , Zhao, T. and Johnson, C. (2014) Timed Fault Tree Models of the China Yongwen Railway Accident. In: 8th Asia Modelling Symposium (AMS 2014), Taipei, Taiwan, 23-25 Sep 2014, pp. 128-133. ISBN 9781479964864 (doi:10.1109/AMS.2014.34)

He, Y., Johnson, C., Lu, Y. and Lin, Y. (2014) Improving the information security management: an industrial study in the privacy of electronic patient records. In: 2014 IEEE 27th International Symposium on Computer-Based Medical Systems (CBMS), New York, NY, 27-29 May 2014, pp. 525-526. (doi:10.1109/CBMS.2014.121)

White, K. J. S., Pezaros, D. P. and Johnson, C. W. (2014) Principles for increased resilience in critical networked infrastructures. In: 6th International Conference on Research in Air Transportation (ICRAT 2014), Istanbul, Turkey, 26/30 May 2014,

He, Y., Johnson, C., Renaud, K., Lu, Y. and Jebriel, S. (2014) An empirical study on the use of the Generic Security Template for structuring the lessons from information security incidents. In: 6th International Conference on Computer Science and Information Technology (CSIT 2014), Amman, Jordan, 26-27 Mar 2014, pp. 178-188. (doi:10.1109/CSIT.2014.6805998)

Evangelopoulou, M. and Johnson, C.W. (2014) Attack visualisation for cyber-security situation awareness. In: 9th IET International Conference on System Safety and Cyber Security, Manchester, England, 15-16 Oct 2014, pp. 1-6. ISBN 9781849199407

Peng, Z., Lu, Y., Miller, A. , Johnson, C. and Zhao, T. (2013) A probabilistic model checking approach to analysing reliability, availability, and maintainability of a single satellite system. In: 7th European Modelling Symposium (EMS2013), Manchester, England, 20-22 Nov 2013, pp. 611-616. (doi:10.1109/EMS.2013.102)

He, Y. and Johnson, C. (2012) Generic security cases for information system security in healthcare systems. In: 7th IET International Conference on System Safety, Incorporating the Cyber Security Conference, Edinburgh, UK, 15-18 Oct 2012, pp. 1-6. (doi:10.1049/cp.2012.1507)

Raue, S., Johnson, C.W. and Storer, T. (2012) A social media audience sharing model for authorities to support effective crisis communication. In: System Safety 2012: The 7th IET Conference on Systems Safety and CyberSecurity, Edinburgh, UK, 15-18 Oct 2012,

White, K. .J.S., Pezaros, D. P. and Johnson, C. W. (2012) Increasing resilience of ATM networks using traffic monitoring and automated anomaly analysis. In: 2nd International Conference on Application and Theory of Automation in Command and Control Systems, Imperial College, London, 29-31 May 2012,

Johnson, C.W. and Holloway, C.M. (2011) Safety arguments for next generation location aware computing. In: 5th IET International Conference on Systems Safety, Manchester, UK, 18-20 Oct 2010, (doi:10.1049/cp.2010.0813)

Johnson, C.W. and Jeunemaitre, A. (2010) Future directions for contingency planning in European Air Traffic Management: a response to the April 2010 Eyjafjallajokull volcano eruption. In: 1st HEC Paris Workshop on Regulation; Emergency Regulation Under the Threat of Catastrophy - A Hard Look at the Volcanic Ash Crisis, Jouy en Josas, France, 10-11 Nov 2010,

Holloway, C.M. and Johnson, C.W. (2010) Epistemic questions and answers for software system safety. In: 28th International Systems Safety Conference, Minneapolis, USA, 30 Aug - 3 Sep 2010,

Johnson, C. (2010) Software configuration management for safety related applications in space systems: extending the application of the USAF 8-Step method. In: International Asosciation for the Advancement of Space Safety Conference, Huntsville, Alabama, 19-21 May 2010,

Johnson, C., Herd, A. and Wolff, M. (2010) The application of resilience engineering to human space flight. In: International Association for the Advancement of Space Safety Conference, Huntsville, Alabama, 19-21 May 2010,

Johnson, C. and Yepez, A.A. (2010) Safety cases for global navigation satellite systems' Safety of Life (SoL) applications. In: International Asosciation for the Advancement of Space Safety Conference, Huntsville, Alabama, 19-21 May 2010,

Nilsen-Nygaard, L. and Johnson, C.W. (2010) The role of simulations in preparing for terrorism. In: 28th International Systems Safety Conference, Minneapolis, USA, 30 Aug - 3 Sep 2010,

Raue, S. and Johnson, C.W. (2010) Using Web Service Architectures and Advanced Simulation Tools to ensure that cost savings in strategic funding for Emergency Services do not jeopardize the safety of local communities. In: 28th International Systems Safety Conference, Minneapolis, USA, 30 Aug - 3 Sep 2010,

Fletcher, L.L., Kaiser, J.M., Johnson, C.W. and Shea, C. (2009) Configuration management: a critical analysis of applications using the 8-Step problem solving method. In: 27th International Conference on Systems Safety, Huntsville, Alabama, USA, 3-7 Aug 2009, pp. 2807-2817.

Johnson, C.W. (2009) Degraded modes and the 'culture of coping' in military operations: an analysis of a fatal incident on-board HMS Tireless on 20/21 March 2007. In: US Joint Weapons Systems Safety Conference 2009, Huntsville, Alabama, USA, 2009, pp. 3511-3521.

Johnson, C.W. (2009) Insights from the Nogales Predator crash for the integration of UAVs into the National Airspace System under FAA interim operational guidance 08-01. In: 27th International Conference on Systems Safety, Huntsville, Alabama, USA, 3-7 Aug 2009, pp. 3066-3076.

Johnson, C.W. (2009) Interactions between brown-out accidents and night vision equipment in military aviation accidents. In: US Joint Weapons Systems Safety Conference 2009, Huntsville, Alabama, USA, 2009, pp. 3508-3518.

Johnson, C.W. (2009) The dangers of interaction with modular and self-healing avionics applications: redundancy considered harmful. In: 27th International Conference on Systems Safety, Huntsville, Alabama, USA, 3-7 Aug 2009, pp. 3044-3054.

Johnson, C.W. (2009) The safety research challenges for the Air Traffic Management Of Unmanned Aerial Systems (UAS). In: 6th EUROCONTROL Experimental Centre Safety Research and Development Workshop, Munich, Germany, 21-22 Oct 2009,

Johnson, C.W., Fletcher, L.L., Holloway, C.M. and Shea, C. (2009) Configuration Management as a common factor in space related mishaps. In: 27th International Conference on Systems Safety, Huntsville, Alabama, USA, 3-7 Aug 2009, pp. 3047-3057.

Johnson, C.W. and Nilsen-Nygaard, L. (2009) A 'systemic approach' for countering the threat to public safety from Improvised Explosive Devices (IEDs). In: 27th Internatinal Conference on Systems Safety, Huntsville, Alabama, USA, 3-7 Aug 2009, pp. 3048-3058.

Nilsen-Nygaard, L. and Johnson, C.W. (2009) On the validation of counter-IED simulations. In: 27th Internatinal Conference on Systems Safety, Huntsville, Alabama, USA, 3-7 Aug 2009, pp. 3075-3085.

Holloway, C.M. and Johnson, C.W. (2008) How past loss of control accidents may inform safety cases for Advanced Control Systems on commercial aircraft. In: Third IET Systems Safety Conference, NEC, Birmingham, UK, 2008, Birmingham, UK, 20-22 October 2008,

Johnson, C.W. (2008) 'Act in haste, repent at leisure’: an overview of operational incidents involving UAVs in Afghanistan. In: Third IET Systems Safety Conference, NEC, Birmingham, UK, 2008, Birmingham, UK, 20-22 October 2008,

Johnson, C.W. (2008) Have we learned enough from Ueberlingen? The challenges of safety improvement in European Air Traffic Management. In: EUROCONTROL Annual Safety R&D Seminar, Southampton, UK, 22-24 Oct 2008,

Johnson, C.W. (2008) The Hidden Human Factors in Unmanned Aerial Vehicles. In: Proceedings of the 2007 International Systems Safety Society Conference, Baltimore, 2007,

Johnson, C.W. (2008) Military risk assessment in counter insurgency operations: a Case Study in the retrieval of a UAV Nr Sangin, Helmand Province, Afghanistan, 11th June 2006. In: Third IET Systems Safety Conference, NEC, Birmingham, UK, 2008, Birmingham, UK, 20-22 October 2008,

Johnson, C.W. (2008) Understanding failures in international safety-critical infrastructures: a comparison of European and North American power failures. In: 26th International Conference on Systems Safety, Vancouver, Canada, 25-29 Aug 2008,

Johnson, C.W. and McLean, K. (2008) Tools for local critical infrastructure protection. In: Third IET Systems Safety Conference, NEC, Birmingham, UK, 2008, Birmingham, UK, 20-22 October 2008, pp. 1-6.

Johnson, C.W. and Nilsen-Nygaard, L. (2008) Extending the use of evacuation simulators to support counter terrorism: using models of human behaviour to coordinate emergency responses to Improvised Explosive Devices. In: 26th International System Safety Conference ISSC 08, Vancouver, British Columbia, Canada, 25-29 Aug 2008, ISBN 0972138587

Johnson, C.W., Shea, C. and Holloway, C.M. (2008) The Role of Trust and Interaction in GPS Related Accidents: A Human Factors Safety Assessment of the Global Positioning System (GPS). In: 26th Annual Conference of the International Systems Safety Society, Vancouver, Canada, August 25-29 2008,

Johnson, C.W. and Williams, R. (2008) Computational support for identifying safety and security interdependencies between National Critical Infrastructures. In: Third IET Systems Safety Conference, NEC, Birmingham, UK, 2008, Birmingham, UK, 20-22 October 2008,

Nilsen-Nygaard, L. and Johnson, C.W. (2008) Using mathematical models to guide the simuation of Improvised Explosive Devices in public spaces. In: Third IET Systems Safety Conference, NEC, Birmingham, UK, 2008, Birmingham, UK, 20-22 October 2008,

Whiteley, I., Bogatyreva, O., Johnson, C.W., Wolff, M. and Townend, M. (2008) Human missions to Mars: designing decision-support tools for a safety critical environment. In: 3rd IAASS Conference, Rome, Italy, 21-23 Oct 2008,

Whiteley, I., Bogatyreva, O., Johnson, C.W., Wolff, M. and Townend, M. (2008) A structured approach to scenario generation for the design of crew decision support tools. In: 3rd IAASS Conference, Rome, Italy, 21-23 Oct 2008,

Johnson, C. (2007) A look at aircraft accident investigation in the early days: do early 20th century accident investgation techniques have any lessons for today? In: 2nd Institution of Engineering and Technology International Conference on System Safety 2007, Savoy Place, London, 22-24 October 2007, pp. 235-240.

Johnson, C. (2007) The systemic effects of fatigue on military operations. In: 2nd IET International Conference on System Safety 2007, London, 22-24 October, 2007, pp. 1-6. (doi:10.1049/cp:20070432)

Johnson, C. and Holloway, C.M. (2007) A historical perspective on aviation accident investigation. In: 2nd Institution of Engineering and Technology International Conference on System Safety 2007, Savoy Place, London, 22-24 October 2007,

Johnson, C. (2005) Proceedings of the Second Workshop on Complexity in Design and Engineering. In: 2nd Workshop on Complexity in Design and Engineering, Glasgow, Scotland, 10-12 March, 2005,

Johnson, C.W. (2005) Applying the lessons of the attack on the World Trade Center, 11th September 2001, to the design and use of interactive evacuation simulations. In: Conference on Human Factors in Computing Systems, Portland, Oregon, 2-7 April 2005, pp. 651-660. ISBN 1-58113-998-5 (doi:10.1145/1054972.1055062)

This list was generated on Sat Nov 18 15:07:12 2017 GMT.