Dr Tim Storer

  • Senior Lecturer (Computing Science)

telephone: 4970
email: Timothy.Storer@glasgow.ac.uk

Room S142, Computing Science, Lilybank Gardens, Glasgow G12 8QQ

Import to contacts

ORCID iDhttps://orcid.org/0000-0002-4026-097X

Research interests

Personal site: http://www.dcs.gla.ac.uk/~tws

Biography:
I am a senior lecturer in Software Engineering at the School of Computing Science, University of Glasgow. Between 2006 and 2009 I was a research assistant at the University of St Andrews working for Ian Sommerville. I have research interests in software engineering practice, empirical software engineering and large scale complex systems engineering.

 

Within the School of Computing Science, Dr Storer leads the Software Engineering Laboratory, is the Director of the Glasgow University Software Service and is Deputy Director of the Scottish Computer Science and Informatics Alliance research pool.

Publications

List by: Type | Date

Jump to: 2025 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008
Number of items: 46.

2025

Nabi, Syed Waqar ORCID logoORCID: https://orcid.org/0000-0003-3835-4851, Andrei, Oana ORCID logoORCID: https://orcid.org/0000-0002-1306-0219, Barr, Matthew ORCID logoORCID: https://orcid.org/0000-0002-5147-0673, Cutts, Quintin ORCID logoORCID: https://orcid.org/0000-0002-6368-9912, Maguire, Joseph ORCID logoORCID: https://orcid.org/0000-0002-3718-7679, Morrison, Alistair, Parkinson, Jack ORCID logoORCID: https://orcid.org/0000-0001-6175-7638, Somerville, Derek and Storer, Tim ORCID logoORCID: https://orcid.org/0000-0002-4026-097X (2025) Assessing Work-Based Learning in the Senior Years of a Software Engineering Graduate Apprenticeship Program. In: IEEE Conference on Software Engineering Education and Training (CSEE&T), Ottawa, Ontario, Canada, 28-29 April 2025, (Accepted for Publication)

2022

Alhamed, Mohammed and Storer, Tim ORCID logoORCID: https://orcid.org/0000-0002-4026-097X (2022) Evaluation of Context-Aware Language Models and Experts for Effort Estimation of Software Maintenance Issues. In: 2022 IEEE International Conference on Software Maintenance and Evolution (ICSME 2022), Limisol, Cyprus, 03-07 Oct 2022, pp. 129-138. ISBN 9781665479578 (doi: 10.1109/ICSME55016.2022.00020)

2021

Nystrom, Edwards, Jongsuebchoke, Dhitiwat and Storer, Tim ORCID logoORCID: https://orcid.org/0000-0002-4026-097X (2021) Sciit: embedding issue tracking in source control management. Science of Computer Programming, 206, 102628. (doi: 10.1016/j.scico.2021.102628)

Alhamed, Mohammed and Storer, Tim ORCID logoORCID: https://orcid.org/0000-0002-4026-097X (2021) Playing Planning Poker in Crowds: Human Computation of Software Effort Estimates. In: 2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE), Madrid, Spain, 22-30 May 2021, pp. 1-12. ISBN 9781665402965 (doi: 10.1109/ICSE43902.2021.00014)

2020

Islam, Gibrail and Storer, Tim ORCID logoORCID: https://orcid.org/0000-0002-4026-097X (2020) A case study of agile software development for large-scale safety-critical systems projects. Reliability Engineering and System Safety, 200, 106954. (doi: 10.1016/j.ress.2020.106954)

Wallis, William, Kavanagh, William, Miller, Alice ORCID logoORCID: https://orcid.org/0000-0002-0941-1717 and Storer, Tim ORCID logoORCID: https://orcid.org/0000-0002-4026-097X (2020) Designing a Mobile Game to Generate Player Data - Lessons Learned. In: GAME-ON 2020, Aveiro, Portugal, 23-25 Sept 2020, ISBN 9789492859112

2019

Bob, Ruxandra and Storer, Tim ORCID logoORCID: https://orcid.org/0000-0002-4026-097X (2019) Behave Nicely! Automatic Generation of Code for Behaviour Driven Development Test Suites. In: 19th IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2019), Cleveland, OH, USA, 30 Sep - 01 Oct 2019, pp. 228-237. ISBN 9781728149370 (doi: 10.1109/SCAM.2019.00033)

Alhamed, Mohammed and Storer, Tim ORCID logoORCID: https://orcid.org/0000-0002-4026-097X (2019) Estimating Software Task Effort in Crowds. In: 35th IEEE International Conference on Software Maintenance and Evolution (ICSME 2019), Cleveland, OH, USA, 30 Sep - 04 Oct 2019, pp. 281-285. ISBN 9781728130941 (doi: 10.1109/ICSME.2019.00042)

Edwards, Nystrom, Jongsuebchoke, Dhitiwat and Storer, Tim ORCID logoORCID: https://orcid.org/0000-0002-4026-097X (2019) Sciit: Aligning Source Control Management and Issue Tracking Architectures. In: 35th IEEE International Conference on Software Maintenance and Evolution (ICSME 2019), Cleveland, OH, USA, 30 Sep - 04 Oct 2019, pp. 402-405. ISBN 9781728130958 (doi: 10.1109/ICSME.2019.00069)

Alkharashi, Abdulwhab, Storer, Tim ORCID logoORCID: https://orcid.org/0000-0002-4026-097X, Jose, Joemon ORCID logoORCID: https://orcid.org/0000-0001-9228-1759, Hoskins, Andrew ORCID logoORCID: https://orcid.org/0000-0002-1207-2728 and Happer, Catherine ORCID logoORCID: https://orcid.org/0000-0002-9711-8544 (2019) Understanding Abusive Behaviour Between Online and Offline Group Discussions. In: CHI 2019: 37th Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems, New York, NY, USA, 4-9 May 2019, CS15. ISBN 9781450359719 (doi: 10.1145/3290607.3299042)

2018

Alshammari, Dhahi, Singer, Jeremy ORCID logoORCID: https://orcid.org/0000-0001-9462-6802 and Storer, Timothy ORCID logoORCID: https://orcid.org/0000-0002-4026-097X (2018) Performance Evaluation of Cloud Computing Simulation Tools. In: IEEE 3rd International Conference on Cloud Computing and Big Data Analysis (ICCCBDA 2018), Chengdu, China, 20-22 Apr 2018, pp. 522-526. ISBN 9781538643013 (doi: 10.1109/ICCCBDA.2018.8386571)

Baalous, Rawan, Poet, Ronald and Storer, Timothy ORCID logoORCID: https://orcid.org/0000-0002-4026-097X (2018) Analyzing Privacy Policies of Zero Knowledge Cloud Storage Applications on Mobile Devices. In: 2018 IEEE International Conference on Cloud Engineering (IC2E), Orlando, Florida, USA, 17-20 April 2018, pp. 218-224. ISBN 9781538650097 (doi: 10.1109/IC2E.2018.00047)

Simpson, Robbie ORCID logoORCID: https://orcid.org/0000-0002-7592-5900 and Storer, Tim ORCID logoORCID: https://orcid.org/0000-0002-4026-097X (2018) Third-party verifiable voting systems: addressing motivation and incentives in e-voting. Journal of Information Security and Applications, 38, pp. 132-138. (doi: 10.1016/j.jisa.2017.11.005)

Wallis, Tom ORCID logoORCID: https://orcid.org/0000-0002-7563-0133 and Storer, Tim ORCID logoORCID: https://orcid.org/0000-0002-4026-097X (2018) Modelling Realistic User Behaviour in Information Systems Simulations as Fuzzing Aspects. In: CAiSE’18 Forum, Tallinn, Estonia, 11-15 June 2018, pp. 254-268. ISBN 9783319929002 (doi: 10.1007/978-3-319-92901-9)

2017

Simpson, Robbie ORCID logoORCID: https://orcid.org/0000-0002-7592-5900 and Storer, Tim ORCID logoORCID: https://orcid.org/0000-0002-4026-097X (2017) Experimenting with Realism in Software Engineering Team Projects: An Experience Report. In: 30th IEEE Conference on Software Engineering Education and Training (CSEE&T), Savannah, GA, USA, 7-9 Nov 2017, pp. 87-96. ISBN 9781538625361 (doi: 10.1109/CSEET.2017.23)

Alshammari, Dhahi, Singer, Jeremy ORCID logoORCID: https://orcid.org/0000-0001-9462-6802 and Storer, Timothy ORCID logoORCID: https://orcid.org/0000-0002-4026-097X (2017) Does CloudSim Accurately Model Micro Datacenters? In: IEEE International Conference on Cloud Computing (IEEE CLOUD 2017), Honolulu, HI, USA, 25-30 June 2017, pp. 705-709. (doi: 10.1109/CLOUD.2017.97)

Grispos, George, Glisson, William Bradley and Storer, Tim ORCID logoORCID: https://orcid.org/0000-0002-4026-097X (2017) Enhancing security incident response follow-up efforts with lightweight agile retrospectives. Digital Investigation, 22, pp. 62-73. (doi: 10.1016/j.diin.2017.07.006)

Grispos, George, Glisson, William Bradley, Bourrie, David, Storer, Tim ORCID logoORCID: https://orcid.org/0000-0002-4026-097X and Miller, Stacy (2017) Security Incident Recognition and Reporting (SIRR): An Industrial Perspective. 23rd Americas Conference on Information Systems (AMCIS 2017), Boston, MA, USA, 10-12 Aug 2017. ISBN 9780996683142

Storer, Tim ORCID logoORCID: https://orcid.org/0000-0002-4026-097X (2017) Bridging the chasm: a survey of software engineering practice in scientific programming. ACM Computing Surveys, 50(4), 47. (doi: 10.1145/3084225)

2016

Glisson, William B., Storer, Tim ORCID logoORCID: https://orcid.org/0000-0002-4026-097X, Blyth, Andrew, Grispos, George and Campbell, Matt (2016) In-the-wild residual data research and privacy. Journal of Digital Forensics, Security and Law, 11(1), pp. 77-98.

2015

Grispos, George, Glisson, William Bradley and Storer, Timothy ORCID logoORCID: https://orcid.org/0000-0002-4026-097X (2015) Security Incident Response Criteria: A Practitioner's Perspective. 21st Americas Conference on Information Systems, Fajardo, Puerto Rico, 13-15 Aug 2015. ISBN 9780996683104

Grispos, George, Glisson, William Bradley and Storer, Timothy ORCID logoORCID: https://orcid.org/0000-0002-4026-097X (2015) Recovering residual forensic data from smartphone interactions with cloud storage providers. In: Ko, Ryan and Choo, Kim-Kwang Raymond (eds.) The Cloud Security Ecosystem: Technical, Legal, Business and Management Issues. Syngress: Waltham, MA, pp. 347-382. ISBN 9780128015957

Simpson, Robert ORCID logoORCID: https://orcid.org/0000-0002-7592-5900 and Storer, Tim ORCID logoORCID: https://orcid.org/0000-0002-4026-097X (2015) Formalising responsibility modelling for automatic analysis. In: Barjis, Joseph, Pergl, Robert and Babkin, Eduard (eds.) Enterprise and Organizational Modeling and Simulation. Series: Lecture Notes in Business Information Processing (231). Springer Berlin Heidelberg. ISBN 9783319246253

2014

Grispos, George, Glisson, William Bradley and Storer, Timothy ORCID logoORCID: https://orcid.org/0000-0002-4026-097X (2014) Rethinking Security Incident Response: The Integration of Agile Principles. 20th Americas Conference on Information Systems (AMCIS 2014), Savannah, GA, USA, 07-09 Sep 2014. ISBN 9780692253205

Marsh, Stephen, Dwyer, Natasha, Basu, Anirban, Storer, Tim ORCID logoORCID: https://orcid.org/0000-0002-4026-097X, Renaud, Karen, El-Khatib, Khalil, Esfandiari, Babak, Noël, Sylvie and Bicakci, Mehmet Vefa (2014) Foreground trust as a security paradigm: turning users into strong links. In: Kayem, Anne and Meinel, Christoph (eds.) Information Security in Diverse Computing Environments. Series: Advances in information security, privacy, and ethics (AISPE). IGI Global: Hershey, PA, pp. 8-23. ISBN 9781466661585

2013

Crawford, Heather, Renaud, Karen and Storer, Tim ORCID logoORCID: https://orcid.org/0000-0002-4026-097X (2013) A framework for continuous, transparent mobile device authentication. Computers and Security, 39(B), pp. 127-136. (doi: 10.1016/j.cose.2013.05.005)

Glisson, William Bradley and Storer, Tim ORCID logoORCID: https://orcid.org/0000-0002-4026-097X (2013) Investigating Information Security Risks of Mobile Device Use within Organizations. In: 19th Americas Conference on Information Systems, Chicago, IL, USA, 15-17 Aug 2013,

Glisson, W.B., Storer, T. ORCID logoORCID: https://orcid.org/0000-0002-4026-097X and Buchanan-Wollaston, J. (2013) An empirical comparison of data recovered from mobile forensic toolkits. Digital Investigation, 10(1), pp. 44-55. (doi: 10.1016/j.diin.2013.03.004)

Buchanan-Wollaston, J., Storer, T. ORCID logoORCID: https://orcid.org/0000-0002-4026-097X and Glisson, W. (2013) A comparison of forensic toolkits and mass market data recovery applications. In: Ninth Annual IFIP WG 11.9 International Conference on Digital Forensics, National Center for Forensic Science Orlando, FL, USA, 28-30 Jan 2013,

Grispos, G., Glisson, W. and Storer, T. ORCID logoORCID: https://orcid.org/0000-0002-4026-097X (2013) Using smartphones as a proxy for forensic evidence contained in cloud storage services. In: 46th Hawaii International Conference on System Sciences (HICSS-46), Grand Wailea, Maui, Hawaii, 7-10 Jan 2013, pp. 4910-4919. (doi: 10.1109/HICSS.2013.592)

Grispos, G., Glisson, W.B. and Storer, T. ORCID logoORCID: https://orcid.org/0000-0002-4026-097X (2013) Cloud security challenges: investigating policies, standards, and guidelines in a Fortune 500 organization. In: 21st European Conference on Information Systems, Utrecht, The Netherlands, 5-8 Jun 2013,

Storer, T. ORCID logoORCID: https://orcid.org/0000-0002-4026-097X, Marsh, S., Noël, S., Esfandiari, B., El-Khatib, K., Briggs, P., Renaud, K. and Bicakci, M.V. (2013) Encouraging second thoughts: obstructive user interfaces for raising security awareness. In: Privacy Security Trust 2013, Catalonia, Spain, 10-12 July 2013,

2012

Sommerville, I., Lock, R. and Storer, T. ORCID logoORCID: https://orcid.org/0000-0002-4026-097X (2012) Information requirements for enterprise systems. In: Calinescu, R. and Garlan, D. (eds.) Large-scale Complex IT Systems: Development, Operation and Management. Series: Lecture notes in computer science (7539). Springer-Verlag: New York, NY, USA, pp. 266-282. ISBN 9783642340581 (doi: 10.1007/978-3-642-34059-8_14)

Storer, T. ORCID logoORCID: https://orcid.org/0000-0002-4026-097X, Renaud, K. and Glisson, W. (2012) Patterns of information security postures for socio-technical systems and systems-of-systems. In: First International Workshop on Cyberpatterns, Abingdon, Oxfordshire, UK, 9-10 Jul 2012,

Marsh, S. et al. (2012) Non-standards for trust: foreground trust and second thoughts for mobile security. In: Meadows, C.A. and Fernandez-Gago, C. (eds.) Security and Trust Management. Series: Lecture Notes in Computer Science (7170). Springer Verlag: Berlin, Germany, pp. 28-39. ISBN 9783642299629 (doi: 10.1007/978-3-642-29963-6_4)

Grispos, G., Storer, T. ORCID logoORCID: https://orcid.org/0000-0002-4026-097X and Glisson, W. (2012) Calm before the storm: the challenges of cloud computing in digital forensics. International Journal of Digital Crime and Forensics, 4(2), pp. 28-48. (doi: 10.4018/jdcf.2012040103)

Raue, S., Johnson, C.W. ORCID logoORCID: https://orcid.org/0000-0002-1052-9851 and Storer, T. ORCID logoORCID: https://orcid.org/0000-0002-4026-097X (2012) A social media audience sharing model for authorities to support effective crisis communication. In: System Safety 2012: The 7th IET Conference on Systems Safety and CyberSecurity, Edinburgh, UK, 15-18 Oct 2012,

2011

Glisson, W., Storer, T. ORCID logoORCID: https://orcid.org/0000-0002-4026-097X, Mayall, G., Moug, I. and Grispos, G. (2011) Electronic retention: what does your mobile phone reveal about you? International Journal of Information Security, 10(6), pp. 337-349. (doi: 10.1007/s10207-011-0144-3)

Grispos, G., Storer, T. ORCID logoORCID: https://orcid.org/0000-0002-4026-097X and Glisson, W.B. (2011) A comparison of forensic evidence recovery techniques for a windows mobile smart phone. Digital Investigation, 8(1), pp. 23-36. (doi: 10.1016/j.diin.2011.05.016)

2010

Storer, T. ORCID logoORCID: https://orcid.org/0000-0002-4026-097X, Glisson, W. and Grispos, G. (2010) Investigating information recovered from re-sold mobile. In: Privacy and Usability Methods Pow-wow (PUMP) 2010, Dundee, UK, 6 Sep 2010,

2009

Lock, R., Storer, T. ORCID logoORCID: https://orcid.org/0000-0002-4026-097X and Sommerville, I. (2009) Responsibility modelling for risk analysis. In: ESREL 2009 Annual Conference, Prague, Czech Republic, 7-10 Sep 2009,

Sommerville, I., Lock, R., Storer, T. ORCID logoORCID: https://orcid.org/0000-0002-4026-097X and Dobson, J. (2009) Deriving Information Requirements from Responsibility Models. In: Advanced Information Systems Engineering, 21st International Conference, CAiSE 2009, Amsterdam, The Netherlands, 8-12 Jun 2009, pp. 515-529. (doi: 10.1007/978-3-642-02144-2_40)

Storer, T. ORCID logoORCID: https://orcid.org/0000-0002-4026-097X and Lock, R. (2009) Accuracy: The fundamental requirement for voting systems. In: The Third International Conference on Availability, Reliability and Security, ARES 2009, Fukuoka, Japan, 16-19 Mar 2009, pp. 374-379. ISBN 9781424435722 (doi: 10.1109/ARES.2009.133)

Sommerville, Ian, Storer, Timothy ORCID logoORCID: https://orcid.org/0000-0002-4026-097X and Lock, Russell (2009) Responsibility modelling for civil emergency planning. Risk Management, 11(3-4), pp. 179-207. (doi: 10.1057/rm.2009.11)

2008

Little, L., Storer, T. ORCID logoORCID: https://orcid.org/0000-0002-4026-097X, Briggs, P. and Duncan, I. (2008) E-Voting in an ubicomp world: trust, privacy, and social implications. Social Science Computer Review, 26(1), pp. 44-59. (doi: 10.1177/0894439307307683)

Lock, R., Storer, T. ORCID logoORCID: https://orcid.org/0000-0002-4026-097X, Harvey, N., Hughes, C. and Sommerville, I. (2008) Observations of the Scottish elections 2007. Transforming Government: People, Process and Policy, 2(2), pp. 104-118. (doi: 10.1108/17506160810876185)

This list was generated on Sat Jun 14 08:21:21 2025 BST.
Number of items: 46.

Articles

Nystrom, Edwards, Jongsuebchoke, Dhitiwat and Storer, Tim ORCID logoORCID: https://orcid.org/0000-0002-4026-097X (2021) Sciit: embedding issue tracking in source control management. Science of Computer Programming, 206, 102628. (doi: 10.1016/j.scico.2021.102628)

Islam, Gibrail and Storer, Tim ORCID logoORCID: https://orcid.org/0000-0002-4026-097X (2020) A case study of agile software development for large-scale safety-critical systems projects. Reliability Engineering and System Safety, 200, 106954. (doi: 10.1016/j.ress.2020.106954)

Simpson, Robbie ORCID logoORCID: https://orcid.org/0000-0002-7592-5900 and Storer, Tim ORCID logoORCID: https://orcid.org/0000-0002-4026-097X (2018) Third-party verifiable voting systems: addressing motivation and incentives in e-voting. Journal of Information Security and Applications, 38, pp. 132-138. (doi: 10.1016/j.jisa.2017.11.005)

Grispos, George, Glisson, William Bradley and Storer, Tim ORCID logoORCID: https://orcid.org/0000-0002-4026-097X (2017) Enhancing security incident response follow-up efforts with lightweight agile retrospectives. Digital Investigation, 22, pp. 62-73. (doi: 10.1016/j.diin.2017.07.006)

Storer, Tim ORCID logoORCID: https://orcid.org/0000-0002-4026-097X (2017) Bridging the chasm: a survey of software engineering practice in scientific programming. ACM Computing Surveys, 50(4), 47. (doi: 10.1145/3084225)

Glisson, William B., Storer, Tim ORCID logoORCID: https://orcid.org/0000-0002-4026-097X, Blyth, Andrew, Grispos, George and Campbell, Matt (2016) In-the-wild residual data research and privacy. Journal of Digital Forensics, Security and Law, 11(1), pp. 77-98.

Crawford, Heather, Renaud, Karen and Storer, Tim ORCID logoORCID: https://orcid.org/0000-0002-4026-097X (2013) A framework for continuous, transparent mobile device authentication. Computers and Security, 39(B), pp. 127-136. (doi: 10.1016/j.cose.2013.05.005)

Glisson, W.B., Storer, T. ORCID logoORCID: https://orcid.org/0000-0002-4026-097X and Buchanan-Wollaston, J. (2013) An empirical comparison of data recovered from mobile forensic toolkits. Digital Investigation, 10(1), pp. 44-55. (doi: 10.1016/j.diin.2013.03.004)

Grispos, G., Storer, T. ORCID logoORCID: https://orcid.org/0000-0002-4026-097X and Glisson, W. (2012) Calm before the storm: the challenges of cloud computing in digital forensics. International Journal of Digital Crime and Forensics, 4(2), pp. 28-48. (doi: 10.4018/jdcf.2012040103)

Glisson, W., Storer, T. ORCID logoORCID: https://orcid.org/0000-0002-4026-097X, Mayall, G., Moug, I. and Grispos, G. (2011) Electronic retention: what does your mobile phone reveal about you? International Journal of Information Security, 10(6), pp. 337-349. (doi: 10.1007/s10207-011-0144-3)

Grispos, G., Storer, T. ORCID logoORCID: https://orcid.org/0000-0002-4026-097X and Glisson, W.B. (2011) A comparison of forensic evidence recovery techniques for a windows mobile smart phone. Digital Investigation, 8(1), pp. 23-36. (doi: 10.1016/j.diin.2011.05.016)

Sommerville, Ian, Storer, Timothy ORCID logoORCID: https://orcid.org/0000-0002-4026-097X and Lock, Russell (2009) Responsibility modelling for civil emergency planning. Risk Management, 11(3-4), pp. 179-207. (doi: 10.1057/rm.2009.11)

Little, L., Storer, T. ORCID logoORCID: https://orcid.org/0000-0002-4026-097X, Briggs, P. and Duncan, I. (2008) E-Voting in an ubicomp world: trust, privacy, and social implications. Social Science Computer Review, 26(1), pp. 44-59. (doi: 10.1177/0894439307307683)

Lock, R., Storer, T. ORCID logoORCID: https://orcid.org/0000-0002-4026-097X, Harvey, N., Hughes, C. and Sommerville, I. (2008) Observations of the Scottish elections 2007. Transforming Government: People, Process and Policy, 2(2), pp. 104-118. (doi: 10.1108/17506160810876185)

Book Sections

Grispos, George, Glisson, William Bradley and Storer, Timothy ORCID logoORCID: https://orcid.org/0000-0002-4026-097X (2015) Recovering residual forensic data from smartphone interactions with cloud storage providers. In: Ko, Ryan and Choo, Kim-Kwang Raymond (eds.) The Cloud Security Ecosystem: Technical, Legal, Business and Management Issues. Syngress: Waltham, MA, pp. 347-382. ISBN 9780128015957

Simpson, Robert ORCID logoORCID: https://orcid.org/0000-0002-7592-5900 and Storer, Tim ORCID logoORCID: https://orcid.org/0000-0002-4026-097X (2015) Formalising responsibility modelling for automatic analysis. In: Barjis, Joseph, Pergl, Robert and Babkin, Eduard (eds.) Enterprise and Organizational Modeling and Simulation. Series: Lecture Notes in Business Information Processing (231). Springer Berlin Heidelberg. ISBN 9783319246253

Marsh, Stephen, Dwyer, Natasha, Basu, Anirban, Storer, Tim ORCID logoORCID: https://orcid.org/0000-0002-4026-097X, Renaud, Karen, El-Khatib, Khalil, Esfandiari, Babak, Noël, Sylvie and Bicakci, Mehmet Vefa (2014) Foreground trust as a security paradigm: turning users into strong links. In: Kayem, Anne and Meinel, Christoph (eds.) Information Security in Diverse Computing Environments. Series: Advances in information security, privacy, and ethics (AISPE). IGI Global: Hershey, PA, pp. 8-23. ISBN 9781466661585

Sommerville, I., Lock, R. and Storer, T. ORCID logoORCID: https://orcid.org/0000-0002-4026-097X (2012) Information requirements for enterprise systems. In: Calinescu, R. and Garlan, D. (eds.) Large-scale Complex IT Systems: Development, Operation and Management. Series: Lecture notes in computer science (7539). Springer-Verlag: New York, NY, USA, pp. 266-282. ISBN 9783642340581 (doi: 10.1007/978-3-642-34059-8_14)

Marsh, S. et al. (2012) Non-standards for trust: foreground trust and second thoughts for mobile security. In: Meadows, C.A. and Fernandez-Gago, C. (eds.) Security and Trust Management. Series: Lecture Notes in Computer Science (7170). Springer Verlag: Berlin, Germany, pp. 28-39. ISBN 9783642299629 (doi: 10.1007/978-3-642-29963-6_4)

Conference or Workshop Item

Grispos, George, Glisson, William Bradley, Bourrie, David, Storer, Tim ORCID logoORCID: https://orcid.org/0000-0002-4026-097X and Miller, Stacy (2017) Security Incident Recognition and Reporting (SIRR): An Industrial Perspective. 23rd Americas Conference on Information Systems (AMCIS 2017), Boston, MA, USA, 10-12 Aug 2017. ISBN 9780996683142

Grispos, George, Glisson, William Bradley and Storer, Timothy ORCID logoORCID: https://orcid.org/0000-0002-4026-097X (2015) Security Incident Response Criteria: A Practitioner's Perspective. 21st Americas Conference on Information Systems, Fajardo, Puerto Rico, 13-15 Aug 2015. ISBN 9780996683104

Grispos, George, Glisson, William Bradley and Storer, Timothy ORCID logoORCID: https://orcid.org/0000-0002-4026-097X (2014) Rethinking Security Incident Response: The Integration of Agile Principles. 20th Americas Conference on Information Systems (AMCIS 2014), Savannah, GA, USA, 07-09 Sep 2014. ISBN 9780692253205

Conference Proceedings

Nabi, Syed Waqar ORCID logoORCID: https://orcid.org/0000-0003-3835-4851, Andrei, Oana ORCID logoORCID: https://orcid.org/0000-0002-1306-0219, Barr, Matthew ORCID logoORCID: https://orcid.org/0000-0002-5147-0673, Cutts, Quintin ORCID logoORCID: https://orcid.org/0000-0002-6368-9912, Maguire, Joseph ORCID logoORCID: https://orcid.org/0000-0002-3718-7679, Morrison, Alistair, Parkinson, Jack ORCID logoORCID: https://orcid.org/0000-0001-6175-7638, Somerville, Derek and Storer, Tim ORCID logoORCID: https://orcid.org/0000-0002-4026-097X (2025) Assessing Work-Based Learning in the Senior Years of a Software Engineering Graduate Apprenticeship Program. In: IEEE Conference on Software Engineering Education and Training (CSEE&T), Ottawa, Ontario, Canada, 28-29 April 2025, (Accepted for Publication)

Alhamed, Mohammed and Storer, Tim ORCID logoORCID: https://orcid.org/0000-0002-4026-097X (2022) Evaluation of Context-Aware Language Models and Experts for Effort Estimation of Software Maintenance Issues. In: 2022 IEEE International Conference on Software Maintenance and Evolution (ICSME 2022), Limisol, Cyprus, 03-07 Oct 2022, pp. 129-138. ISBN 9781665479578 (doi: 10.1109/ICSME55016.2022.00020)

Alhamed, Mohammed and Storer, Tim ORCID logoORCID: https://orcid.org/0000-0002-4026-097X (2021) Playing Planning Poker in Crowds: Human Computation of Software Effort Estimates. In: 2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE), Madrid, Spain, 22-30 May 2021, pp. 1-12. ISBN 9781665402965 (doi: 10.1109/ICSE43902.2021.00014)

Wallis, William, Kavanagh, William, Miller, Alice ORCID logoORCID: https://orcid.org/0000-0002-0941-1717 and Storer, Tim ORCID logoORCID: https://orcid.org/0000-0002-4026-097X (2020) Designing a Mobile Game to Generate Player Data - Lessons Learned. In: GAME-ON 2020, Aveiro, Portugal, 23-25 Sept 2020, ISBN 9789492859112

Bob, Ruxandra and Storer, Tim ORCID logoORCID: https://orcid.org/0000-0002-4026-097X (2019) Behave Nicely! Automatic Generation of Code for Behaviour Driven Development Test Suites. In: 19th IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2019), Cleveland, OH, USA, 30 Sep - 01 Oct 2019, pp. 228-237. ISBN 9781728149370 (doi: 10.1109/SCAM.2019.00033)

Alhamed, Mohammed and Storer, Tim ORCID logoORCID: https://orcid.org/0000-0002-4026-097X (2019) Estimating Software Task Effort in Crowds. In: 35th IEEE International Conference on Software Maintenance and Evolution (ICSME 2019), Cleveland, OH, USA, 30 Sep - 04 Oct 2019, pp. 281-285. ISBN 9781728130941 (doi: 10.1109/ICSME.2019.00042)

Edwards, Nystrom, Jongsuebchoke, Dhitiwat and Storer, Tim ORCID logoORCID: https://orcid.org/0000-0002-4026-097X (2019) Sciit: Aligning Source Control Management and Issue Tracking Architectures. In: 35th IEEE International Conference on Software Maintenance and Evolution (ICSME 2019), Cleveland, OH, USA, 30 Sep - 04 Oct 2019, pp. 402-405. ISBN 9781728130958 (doi: 10.1109/ICSME.2019.00069)

Alkharashi, Abdulwhab, Storer, Tim ORCID logoORCID: https://orcid.org/0000-0002-4026-097X, Jose, Joemon ORCID logoORCID: https://orcid.org/0000-0001-9228-1759, Hoskins, Andrew ORCID logoORCID: https://orcid.org/0000-0002-1207-2728 and Happer, Catherine ORCID logoORCID: https://orcid.org/0000-0002-9711-8544 (2019) Understanding Abusive Behaviour Between Online and Offline Group Discussions. In: CHI 2019: 37th Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems, New York, NY, USA, 4-9 May 2019, CS15. ISBN 9781450359719 (doi: 10.1145/3290607.3299042)

Alshammari, Dhahi, Singer, Jeremy ORCID logoORCID: https://orcid.org/0000-0001-9462-6802 and Storer, Timothy ORCID logoORCID: https://orcid.org/0000-0002-4026-097X (2018) Performance Evaluation of Cloud Computing Simulation Tools. In: IEEE 3rd International Conference on Cloud Computing and Big Data Analysis (ICCCBDA 2018), Chengdu, China, 20-22 Apr 2018, pp. 522-526. ISBN 9781538643013 (doi: 10.1109/ICCCBDA.2018.8386571)

Baalous, Rawan, Poet, Ronald and Storer, Timothy ORCID logoORCID: https://orcid.org/0000-0002-4026-097X (2018) Analyzing Privacy Policies of Zero Knowledge Cloud Storage Applications on Mobile Devices. In: 2018 IEEE International Conference on Cloud Engineering (IC2E), Orlando, Florida, USA, 17-20 April 2018, pp. 218-224. ISBN 9781538650097 (doi: 10.1109/IC2E.2018.00047)

Wallis, Tom ORCID logoORCID: https://orcid.org/0000-0002-7563-0133 and Storer, Tim ORCID logoORCID: https://orcid.org/0000-0002-4026-097X (2018) Modelling Realistic User Behaviour in Information Systems Simulations as Fuzzing Aspects. In: CAiSE’18 Forum, Tallinn, Estonia, 11-15 June 2018, pp. 254-268. ISBN 9783319929002 (doi: 10.1007/978-3-319-92901-9)

Simpson, Robbie ORCID logoORCID: https://orcid.org/0000-0002-7592-5900 and Storer, Tim ORCID logoORCID: https://orcid.org/0000-0002-4026-097X (2017) Experimenting with Realism in Software Engineering Team Projects: An Experience Report. In: 30th IEEE Conference on Software Engineering Education and Training (CSEE&T), Savannah, GA, USA, 7-9 Nov 2017, pp. 87-96. ISBN 9781538625361 (doi: 10.1109/CSEET.2017.23)

Alshammari, Dhahi, Singer, Jeremy ORCID logoORCID: https://orcid.org/0000-0001-9462-6802 and Storer, Timothy ORCID logoORCID: https://orcid.org/0000-0002-4026-097X (2017) Does CloudSim Accurately Model Micro Datacenters? In: IEEE International Conference on Cloud Computing (IEEE CLOUD 2017), Honolulu, HI, USA, 25-30 June 2017, pp. 705-709. (doi: 10.1109/CLOUD.2017.97)

Glisson, William Bradley and Storer, Tim ORCID logoORCID: https://orcid.org/0000-0002-4026-097X (2013) Investigating Information Security Risks of Mobile Device Use within Organizations. In: 19th Americas Conference on Information Systems, Chicago, IL, USA, 15-17 Aug 2013,

Buchanan-Wollaston, J., Storer, T. ORCID logoORCID: https://orcid.org/0000-0002-4026-097X and Glisson, W. (2013) A comparison of forensic toolkits and mass market data recovery applications. In: Ninth Annual IFIP WG 11.9 International Conference on Digital Forensics, National Center for Forensic Science Orlando, FL, USA, 28-30 Jan 2013,

Grispos, G., Glisson, W. and Storer, T. ORCID logoORCID: https://orcid.org/0000-0002-4026-097X (2013) Using smartphones as a proxy for forensic evidence contained in cloud storage services. In: 46th Hawaii International Conference on System Sciences (HICSS-46), Grand Wailea, Maui, Hawaii, 7-10 Jan 2013, pp. 4910-4919. (doi: 10.1109/HICSS.2013.592)

Grispos, G., Glisson, W.B. and Storer, T. ORCID logoORCID: https://orcid.org/0000-0002-4026-097X (2013) Cloud security challenges: investigating policies, standards, and guidelines in a Fortune 500 organization. In: 21st European Conference on Information Systems, Utrecht, The Netherlands, 5-8 Jun 2013,

Storer, T. ORCID logoORCID: https://orcid.org/0000-0002-4026-097X, Marsh, S., Noël, S., Esfandiari, B., El-Khatib, K., Briggs, P., Renaud, K. and Bicakci, M.V. (2013) Encouraging second thoughts: obstructive user interfaces for raising security awareness. In: Privacy Security Trust 2013, Catalonia, Spain, 10-12 July 2013,

Storer, T. ORCID logoORCID: https://orcid.org/0000-0002-4026-097X, Renaud, K. and Glisson, W. (2012) Patterns of information security postures for socio-technical systems and systems-of-systems. In: First International Workshop on Cyberpatterns, Abingdon, Oxfordshire, UK, 9-10 Jul 2012,

Raue, S., Johnson, C.W. ORCID logoORCID: https://orcid.org/0000-0002-1052-9851 and Storer, T. ORCID logoORCID: https://orcid.org/0000-0002-4026-097X (2012) A social media audience sharing model for authorities to support effective crisis communication. In: System Safety 2012: The 7th IET Conference on Systems Safety and CyberSecurity, Edinburgh, UK, 15-18 Oct 2012,

Storer, T. ORCID logoORCID: https://orcid.org/0000-0002-4026-097X, Glisson, W. and Grispos, G. (2010) Investigating information recovered from re-sold mobile. In: Privacy and Usability Methods Pow-wow (PUMP) 2010, Dundee, UK, 6 Sep 2010,

Lock, R., Storer, T. ORCID logoORCID: https://orcid.org/0000-0002-4026-097X and Sommerville, I. (2009) Responsibility modelling for risk analysis. In: ESREL 2009 Annual Conference, Prague, Czech Republic, 7-10 Sep 2009,

Sommerville, I., Lock, R., Storer, T. ORCID logoORCID: https://orcid.org/0000-0002-4026-097X and Dobson, J. (2009) Deriving Information Requirements from Responsibility Models. In: Advanced Information Systems Engineering, 21st International Conference, CAiSE 2009, Amsterdam, The Netherlands, 8-12 Jun 2009, pp. 515-529. (doi: 10.1007/978-3-642-02144-2_40)

Storer, T. ORCID logoORCID: https://orcid.org/0000-0002-4026-097X and Lock, R. (2009) Accuracy: The fundamental requirement for voting systems. In: The Third International Conference on Availability, Reliability and Security, ARES 2009, Fukuoka, Japan, 16-19 Mar 2009, pp. 374-379. ISBN 9781424435722 (doi: 10.1109/ARES.2009.133)

This list was generated on Sat Jun 14 08:21:21 2025 BST.

Supervision

Research datasets

Jump to: 2022 | 2021
Number of items: 2.

2022

Alhamed, M. and Storer, T. (2022) JOSSE: A Software Development Effort Dataset Annotated with Expert Estimates. [Data Collection]

2021

Happer, C. , Storer, T. , Hoskins, A. and Alkharashi, A. (2021) Public trust and understanding of online content moderation, and its impacts on public discourse. [Data Collection]

This list was generated on Sun Jun 15 09:22:29 2025 BST.