Dr Tim Storer

  • Senior Lecturer (Computing Science)

telephone: 4970
email: Timothy.Storer@glasgow.ac.uk

Room S142, Computing Science, Lilybank Gardens, Glasgow G12 8QQ

Import to contacts

ORCID iDhttps://orcid.org/0000-0002-4026-097X

Research interests

Personal site: http://www.dcs.gla.ac.uk/~tws

Biography:
I am a senior lecturer in Software Engineering at the School of Computing Science, University of Glasgow. Between 2006 and 2009 I was a research assistant at the University of St Andrews working for Ian Sommerville. I have research interests in software engineering practice, empirical software engineering and large scale complex systems engineering.

 

Within the School of Computing Science, Dr Storer leads the Software Engineering Laboratory, is the Director of the Glasgow University Software Service and is Deputy Director of the Scottish Computer Science and Informatics Alliance research pool.

Publications

List by: Type | Date

Jump to: 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008
Number of items: 45.

2022

Alhamed, M. and Storer, T. (2022) Evaluation of Context-Aware Language Models and Experts for Effort Estimation of Software Maintenance Issues. In: 2022 IEEE International Conference on Software Maintenance and Evolution (ICSME 2022), Limisol, Cyprus, 03-07 Oct 2022, pp. 129-138. ISBN 9781665479578 (doi: 10.1109/ICSME55016.2022.00020)

2021

Nystrom, E., Jongsuebchoke, D. and Storer, T. (2021) Sciit: embedding issue tracking in source control management. Science of Computer Programming, 206, 102628. (doi: 10.1016/j.scico.2021.102628)

Alhamed, M. and Storer, T. (2021) Playing Planning Poker in Crowds: Human Computation of Software Effort Estimates. In: 2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE), Madrid, Spain, 22-30 May 2021, pp. 1-12. ISBN 9781665402965 (doi: 10.1109/ICSE43902.2021.00014)

2020

Islam, G. and Storer, T. (2020) A case study of agile software development for large-scale safety-critical systems projects. Reliability Engineering and System Safety, 200, 106954. (doi: 10.1016/j.ress.2020.106954)

Wallis, W., Kavanagh, W., Miller, A. and Storer, T. (2020) Designing a Mobile Game to Generate Player Data - Lessons Learned. In: GAME-ON 2020, Aveiro, Portugal, 23-25 Sept 2020, ISBN 9789492859112

2019

Bob, R. and Storer, T. (2019) Behave Nicely! Automatic Generation of Code for Behaviour Driven Development Test Suites. In: 19th IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2019), Cleveland, OH, USA, 30 Sep - 01 Oct 2019, pp. 228-237. ISBN 9781728149370 (doi: 10.1109/SCAM.2019.00033)

Alhamed, M. and Storer, T. (2019) Estimating Software Task Effort in Crowds. In: 35th IEEE International Conference on Software Maintenance and Evolution (ICSME 2019), Cleveland, OH, USA, 30 Sep - 04 Oct 2019, pp. 281-285. ISBN 9781728130941 (doi: 10.1109/ICSME.2019.00042)

Edwards, N., Jongsuebchoke, D. and Storer, T. (2019) Sciit: Aligning Source Control Management and Issue Tracking Architectures. In: 35th IEEE International Conference on Software Maintenance and Evolution (ICSME 2019), Cleveland, OH, USA, 30 Sep - 04 Oct 2019, pp. 402-405. ISBN 9781728130958 (doi: 10.1109/ICSME.2019.00069)

Alkharashi, A., Storer, T. , Jose, J. , Hoskins, A. and Happer, C. (2019) Understanding Abusive Behaviour Between Online and Offline Group Discussions. In: CHI 2019: 37th Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems, New York, NY, USA, 4-9 May 2019, CS15. ISBN 9781450359719 (doi: 10.1145/3290607.3299042)

2018

Alshammari, D., Singer, J. and Storer, T. (2018) Performance Evaluation of Cloud Computing Simulation Tools. In: IEEE 3rd International Conference on Cloud Computing and Big Data Analysis (ICCCBDA 2018), Chengdu, China, 20-22 Apr 2018, pp. 522-526. ISBN 9781538643013 (doi: 10.1109/ICCCBDA.2018.8386571)

Baalous, R., Poet, R. and Storer, T. (2018) Analyzing Privacy Policies of Zero Knowledge Cloud Storage Applications on Mobile Devices. In: 2018 IEEE International Conference on Cloud Engineering (IC2E), Orlando, Florida, USA, 17-20 April 2018, pp. 218-224. ISBN 9781538650097 (doi: 10.1109/IC2E.2018.00047)

Simpson, R. and Storer, T. (2018) Third-party verifiable voting systems: addressing motivation and incentives in e-voting. Journal of Information Security and Applications, 38, pp. 132-138. (doi: 10.1016/j.jisa.2017.11.005)

Wallis, T. and Storer, T. (2018) Modelling Realistic User Behaviour in Information Systems Simulations as Fuzzing Aspects. In: CAiSE’18 Forum, Tallinn, Estonia, 11-15 June 2018, pp. 254-268. ISBN 9783319929002 (doi: 10.1007/978-3-319-92901-9)

2017

Simpson, R. and Storer, T. (2017) Experimenting with Realism in Software Engineering Team Projects: An Experience Report. In: 30th IEEE Conference on Software Engineering Education and Training (CSEE&T), Savannah, GA, USA, 7-9 Nov 2017, pp. 87-96. ISBN 9781538625361 (doi: 10.1109/CSEET.2017.23)

Alshammari, D., Singer, J. and Storer, T. (2017) Does CloudSim Accurately Model Micro Datacenters? In: IEEE International Conference on Cloud Computing (IEEE CLOUD 2017), Honolulu, HI, USA, 25-30 June 2017, pp. 705-709. (doi: 10.1109/CLOUD.2017.97)

Grispos, G., Glisson, W. B. and Storer, T. (2017) Enhancing security incident response follow-up efforts with lightweight agile retrospectives. Digital Investigation, 22, pp. 62-73. (doi: 10.1016/j.diin.2017.07.006)

Grispos, G., Glisson, W. B., Bourrie, D., Storer, T. and Miller, S. (2017) Security Incident Recognition and Reporting (SIRR): An Industrial Perspective. 23rd Americas Conference on Information Systems (AMCIS 2017), Boston, MA, USA, 10-12 Aug 2017. ISBN 9780996683142

Storer, T. (2017) Bridging the chasm: a survey of software engineering practice in scientific programming. ACM Computing Surveys, 50(4), 47. (doi: 10.1145/3084225)

2016

Glisson, W. B., Storer, T. , Blyth, A., Grispos, G. and Campbell, M. (2016) In-the-wild residual data research and privacy. Journal of Digital Forensics, Security and Law, 11(1), pp. 77-98.

2015

Grispos, G., Glisson, W. B. and Storer, T. (2015) Security Incident Response Criteria: A Practitioner's Perspective. 21st Americas Conference on Information Systems, Fajardo, Puerto Rico, 13-15 Aug 2015. ISBN 9780996683104

Grispos, G., Glisson, W. B. and Storer, T. (2015) Recovering residual forensic data from smartphone interactions with cloud storage providers. In: Ko, R. and Choo, K.-K. R. (eds.) The Cloud Security Ecosystem: Technical, Legal, Business and Management Issues. Syngress: Waltham, MA, pp. 347-382. ISBN 9780128015957

Simpson, R. and Storer, T. (2015) Formalising responsibility modelling for automatic analysis. In: Barjis, J., Pergl, R. and Babkin, E. (eds.) Enterprise and Organizational Modeling and Simulation. Series: Lecture Notes in Business Information Processing (231). Springer Berlin Heidelberg. ISBN 9783319246253

2014

Grispos, G., Glisson, W. B. and Storer, T. (2014) Rethinking Security Incident Response: The Integration of Agile Principles. 20th Americas Conference on Information Systems (AMCIS 2014), Savannah, GA, USA, 07-09 Sep 2014. ISBN 9780692253205

Marsh, S., Dwyer, N., Basu, A., Storer, T. , Renaud, K., El-Khatib, K., Esfandiari, B., Noël, S. and Bicakci, M. V. (2014) Foreground trust as a security paradigm: turning users into strong links. In: Kayem, A. and Meinel, C. (eds.) Information Security in Diverse Computing Environments. Series: Advances in information security, privacy, and ethics (AISPE). IGI Global: Hershey, PA, pp. 8-23. ISBN 9781466661585

2013

Crawford, H., Renaud, K. and Storer, T. (2013) A framework for continuous, transparent mobile device authentication. Computers and Security, 39(B), pp. 127-136. (doi: 10.1016/j.cose.2013.05.005)

Glisson, W. B. and Storer, T. (2013) Investigating Information Security Risks of Mobile Device Use within Organizations. In: 19th Americas Conference on Information Systems, Chicago, IL, USA, 15-17 Aug 2013,

Glisson, W.B., Storer, T. and Buchanan-Wollaston, J. (2013) An empirical comparison of data recovered from mobile forensic toolkits. Digital Investigation, 10(1), pp. 44-55. (doi: 10.1016/j.diin.2013.03.004)

Buchanan-Wollaston, J., Storer, T. and Glisson, W. (2013) A comparison of forensic toolkits and mass market data recovery applications. In: Ninth Annual IFIP WG 11.9 International Conference on Digital Forensics, National Center for Forensic Science Orlando, FL, USA, 28-30 Jan 2013,

Grispos, G., Glisson, W. and Storer, T. (2013) Using smartphones as a proxy for forensic evidence contained in cloud storage services. In: 46th Hawaii International Conference on System Sciences (HICSS-46), Grand Wailea, Maui, Hawaii, 7-10 Jan 2013, pp. 4910-4919. (doi: 10.1109/HICSS.2013.592)

Grispos, G., Glisson, W.B. and Storer, T. (2013) Cloud security challenges: investigating policies, standards, and guidelines in a Fortune 500 organization. In: 21st European Conference on Information Systems, Utrecht, The Netherlands, 5-8 Jun 2013,

Storer, T. , Marsh, S., Noël, S., Esfandiari, B., El-Khatib, K., Briggs, P., Renaud, K. and Bicakci, M.V. (2013) Encouraging second thoughts: obstructive user interfaces for raising security awareness. In: Privacy Security Trust 2013, Catalonia, Spain, 10-12 July 2013,

2012

Sommerville, I., Lock, R. and Storer, T. (2012) Information requirements for enterprise systems. In: Calinescu, R. and Garlan, D. (eds.) Large-scale Complex IT Systems: Development, Operation and Management. Series: Lecture notes in computer science (7539). Springer-Verlag: New York, NY, USA, pp. 266-282. ISBN 9783642340581 (doi: 10.1007/978-3-642-34059-8_14)

Storer, T. , Renaud, K. and Glisson, W. (2012) Patterns of information security postures for socio-technical systems and systems-of-systems. In: First International Workshop on Cyberpatterns, Abingdon, Oxfordshire, UK, 9-10 Jul 2012,

Marsh, S. et al. (2012) Non-standards for trust: foreground trust and second thoughts for mobile security. In: Meadows, C.A. and Fernandez-Gago, C. (eds.) Security and Trust Management. Series: Lecture Notes in Computer Science (7170). Springer Verlag: Berlin, Germany, pp. 28-39. ISBN 9783642299629 (doi: 10.1007/978-3-642-29963-6_4)

Grispos, G., Storer, T. and Glisson, W. (2012) Calm before the storm: the challenges of cloud computing in digital forensics. International Journal of Digital Crime and Forensics, 4(2), pp. 28-48. (doi: 10.4018/jdcf.2012040103)

Raue, S., Johnson, C.W. and Storer, T. (2012) A social media audience sharing model for authorities to support effective crisis communication. In: System Safety 2012: The 7th IET Conference on Systems Safety and CyberSecurity, Edinburgh, UK, 15-18 Oct 2012,

2011

Glisson, W., Storer, T. , Mayall, G., Moug, I. and Grispos, G. (2011) Electronic retention: what does your mobile phone reveal about you? International Journal of Information Security, 10(6), pp. 337-349. (doi: 10.1007/s10207-011-0144-3)

Grispos, G., Storer, T. and Glisson, W.B. (2011) A comparison of forensic evidence recovery techniques for a windows mobile smart phone. Digital Investigation, 8(1), pp. 23-36. (doi: 10.1016/j.diin.2011.05.016)

2010

Storer, T. , Glisson, W. and Grispos, G. (2010) Investigating information recovered from re-sold mobile. In: Privacy and Usability Methods Pow-wow (PUMP) 2010, Dundee, UK, 6 Sep 2010,

2009

Lock, R., Storer, T. and Sommerville, I. (2009) Responsibility modelling for risk analysis. In: ESREL 2009 Annual Conference, Prague, Czech Republic, 7-10 Sep 2009,

Sommerville, I., Lock, R., Storer, T. and Dobson, J. (2009) Deriving Information Requirements from Responsibility Models. In: Advanced Information Systems Engineering, 21st International Conference, CAiSE 2009, Amsterdam, The Netherlands, 8-12 Jun 2009, pp. 515-529. (doi: 10.1007/978-3-642-02144-2_40)

Storer, T. and Lock, R. (2009) Accuracy: The fundamental requirement for voting systems. In: The Third International Conference on Availability, Reliability and Security, ARES 2009, Fukuoka, Japan, 16-19 Mar 2009, pp. 374-379. ISBN 9781424435722 (doi: 10.1109/ARES.2009.133)

Sommerville, I., Storer, T. and Lock, R. (2009) Responsibility modelling for civil emergency planning. Risk Management, 11(3-4), pp. 179-207. (doi: 10.1057/rm.2009.11)

2008

Little, L., Storer, T. , Briggs, P. and Duncan, I. (2008) E-Voting in an ubicomp world: trust, privacy, and social implications. Social Science Computer Review, 26(1), pp. 44-59. (doi: 10.1177/0894439307307683)

Lock, R., Storer, T. , Harvey, N., Hughes, C. and Sommerville, I. (2008) Observations of the Scottish elections 2007. Transforming Government: People, Process and Policy, 2(2), pp. 104-118. (doi: 10.1108/17506160810876185)

This list was generated on Thu Oct 3 13:42:19 2024 BST.
Number of items: 45.

Articles

Nystrom, E., Jongsuebchoke, D. and Storer, T. (2021) Sciit: embedding issue tracking in source control management. Science of Computer Programming, 206, 102628. (doi: 10.1016/j.scico.2021.102628)

Islam, G. and Storer, T. (2020) A case study of agile software development for large-scale safety-critical systems projects. Reliability Engineering and System Safety, 200, 106954. (doi: 10.1016/j.ress.2020.106954)

Simpson, R. and Storer, T. (2018) Third-party verifiable voting systems: addressing motivation and incentives in e-voting. Journal of Information Security and Applications, 38, pp. 132-138. (doi: 10.1016/j.jisa.2017.11.005)

Grispos, G., Glisson, W. B. and Storer, T. (2017) Enhancing security incident response follow-up efforts with lightweight agile retrospectives. Digital Investigation, 22, pp. 62-73. (doi: 10.1016/j.diin.2017.07.006)

Storer, T. (2017) Bridging the chasm: a survey of software engineering practice in scientific programming. ACM Computing Surveys, 50(4), 47. (doi: 10.1145/3084225)

Glisson, W. B., Storer, T. , Blyth, A., Grispos, G. and Campbell, M. (2016) In-the-wild residual data research and privacy. Journal of Digital Forensics, Security and Law, 11(1), pp. 77-98.

Crawford, H., Renaud, K. and Storer, T. (2013) A framework for continuous, transparent mobile device authentication. Computers and Security, 39(B), pp. 127-136. (doi: 10.1016/j.cose.2013.05.005)

Glisson, W.B., Storer, T. and Buchanan-Wollaston, J. (2013) An empirical comparison of data recovered from mobile forensic toolkits. Digital Investigation, 10(1), pp. 44-55. (doi: 10.1016/j.diin.2013.03.004)

Grispos, G., Storer, T. and Glisson, W. (2012) Calm before the storm: the challenges of cloud computing in digital forensics. International Journal of Digital Crime and Forensics, 4(2), pp. 28-48. (doi: 10.4018/jdcf.2012040103)

Glisson, W., Storer, T. , Mayall, G., Moug, I. and Grispos, G. (2011) Electronic retention: what does your mobile phone reveal about you? International Journal of Information Security, 10(6), pp. 337-349. (doi: 10.1007/s10207-011-0144-3)

Grispos, G., Storer, T. and Glisson, W.B. (2011) A comparison of forensic evidence recovery techniques for a windows mobile smart phone. Digital Investigation, 8(1), pp. 23-36. (doi: 10.1016/j.diin.2011.05.016)

Sommerville, I., Storer, T. and Lock, R. (2009) Responsibility modelling for civil emergency planning. Risk Management, 11(3-4), pp. 179-207. (doi: 10.1057/rm.2009.11)

Little, L., Storer, T. , Briggs, P. and Duncan, I. (2008) E-Voting in an ubicomp world: trust, privacy, and social implications. Social Science Computer Review, 26(1), pp. 44-59. (doi: 10.1177/0894439307307683)

Lock, R., Storer, T. , Harvey, N., Hughes, C. and Sommerville, I. (2008) Observations of the Scottish elections 2007. Transforming Government: People, Process and Policy, 2(2), pp. 104-118. (doi: 10.1108/17506160810876185)

Book Sections

Grispos, G., Glisson, W. B. and Storer, T. (2015) Recovering residual forensic data from smartphone interactions with cloud storage providers. In: Ko, R. and Choo, K.-K. R. (eds.) The Cloud Security Ecosystem: Technical, Legal, Business and Management Issues. Syngress: Waltham, MA, pp. 347-382. ISBN 9780128015957

Simpson, R. and Storer, T. (2015) Formalising responsibility modelling for automatic analysis. In: Barjis, J., Pergl, R. and Babkin, E. (eds.) Enterprise and Organizational Modeling and Simulation. Series: Lecture Notes in Business Information Processing (231). Springer Berlin Heidelberg. ISBN 9783319246253

Marsh, S., Dwyer, N., Basu, A., Storer, T. , Renaud, K., El-Khatib, K., Esfandiari, B., Noël, S. and Bicakci, M. V. (2014) Foreground trust as a security paradigm: turning users into strong links. In: Kayem, A. and Meinel, C. (eds.) Information Security in Diverse Computing Environments. Series: Advances in information security, privacy, and ethics (AISPE). IGI Global: Hershey, PA, pp. 8-23. ISBN 9781466661585

Sommerville, I., Lock, R. and Storer, T. (2012) Information requirements for enterprise systems. In: Calinescu, R. and Garlan, D. (eds.) Large-scale Complex IT Systems: Development, Operation and Management. Series: Lecture notes in computer science (7539). Springer-Verlag: New York, NY, USA, pp. 266-282. ISBN 9783642340581 (doi: 10.1007/978-3-642-34059-8_14)

Marsh, S. et al. (2012) Non-standards for trust: foreground trust and second thoughts for mobile security. In: Meadows, C.A. and Fernandez-Gago, C. (eds.) Security and Trust Management. Series: Lecture Notes in Computer Science (7170). Springer Verlag: Berlin, Germany, pp. 28-39. ISBN 9783642299629 (doi: 10.1007/978-3-642-29963-6_4)

Conference or Workshop Item

Grispos, G., Glisson, W. B., Bourrie, D., Storer, T. and Miller, S. (2017) Security Incident Recognition and Reporting (SIRR): An Industrial Perspective. 23rd Americas Conference on Information Systems (AMCIS 2017), Boston, MA, USA, 10-12 Aug 2017. ISBN 9780996683142

Grispos, G., Glisson, W. B. and Storer, T. (2015) Security Incident Response Criteria: A Practitioner's Perspective. 21st Americas Conference on Information Systems, Fajardo, Puerto Rico, 13-15 Aug 2015. ISBN 9780996683104

Grispos, G., Glisson, W. B. and Storer, T. (2014) Rethinking Security Incident Response: The Integration of Agile Principles. 20th Americas Conference on Information Systems (AMCIS 2014), Savannah, GA, USA, 07-09 Sep 2014. ISBN 9780692253205

Conference Proceedings

Alhamed, M. and Storer, T. (2022) Evaluation of Context-Aware Language Models and Experts for Effort Estimation of Software Maintenance Issues. In: 2022 IEEE International Conference on Software Maintenance and Evolution (ICSME 2022), Limisol, Cyprus, 03-07 Oct 2022, pp. 129-138. ISBN 9781665479578 (doi: 10.1109/ICSME55016.2022.00020)

Alhamed, M. and Storer, T. (2021) Playing Planning Poker in Crowds: Human Computation of Software Effort Estimates. In: 2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE), Madrid, Spain, 22-30 May 2021, pp. 1-12. ISBN 9781665402965 (doi: 10.1109/ICSE43902.2021.00014)

Wallis, W., Kavanagh, W., Miller, A. and Storer, T. (2020) Designing a Mobile Game to Generate Player Data - Lessons Learned. In: GAME-ON 2020, Aveiro, Portugal, 23-25 Sept 2020, ISBN 9789492859112

Bob, R. and Storer, T. (2019) Behave Nicely! Automatic Generation of Code for Behaviour Driven Development Test Suites. In: 19th IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2019), Cleveland, OH, USA, 30 Sep - 01 Oct 2019, pp. 228-237. ISBN 9781728149370 (doi: 10.1109/SCAM.2019.00033)

Alhamed, M. and Storer, T. (2019) Estimating Software Task Effort in Crowds. In: 35th IEEE International Conference on Software Maintenance and Evolution (ICSME 2019), Cleveland, OH, USA, 30 Sep - 04 Oct 2019, pp. 281-285. ISBN 9781728130941 (doi: 10.1109/ICSME.2019.00042)

Edwards, N., Jongsuebchoke, D. and Storer, T. (2019) Sciit: Aligning Source Control Management and Issue Tracking Architectures. In: 35th IEEE International Conference on Software Maintenance and Evolution (ICSME 2019), Cleveland, OH, USA, 30 Sep - 04 Oct 2019, pp. 402-405. ISBN 9781728130958 (doi: 10.1109/ICSME.2019.00069)

Alkharashi, A., Storer, T. , Jose, J. , Hoskins, A. and Happer, C. (2019) Understanding Abusive Behaviour Between Online and Offline Group Discussions. In: CHI 2019: 37th Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems, New York, NY, USA, 4-9 May 2019, CS15. ISBN 9781450359719 (doi: 10.1145/3290607.3299042)

Alshammari, D., Singer, J. and Storer, T. (2018) Performance Evaluation of Cloud Computing Simulation Tools. In: IEEE 3rd International Conference on Cloud Computing and Big Data Analysis (ICCCBDA 2018), Chengdu, China, 20-22 Apr 2018, pp. 522-526. ISBN 9781538643013 (doi: 10.1109/ICCCBDA.2018.8386571)

Baalous, R., Poet, R. and Storer, T. (2018) Analyzing Privacy Policies of Zero Knowledge Cloud Storage Applications on Mobile Devices. In: 2018 IEEE International Conference on Cloud Engineering (IC2E), Orlando, Florida, USA, 17-20 April 2018, pp. 218-224. ISBN 9781538650097 (doi: 10.1109/IC2E.2018.00047)

Wallis, T. and Storer, T. (2018) Modelling Realistic User Behaviour in Information Systems Simulations as Fuzzing Aspects. In: CAiSE’18 Forum, Tallinn, Estonia, 11-15 June 2018, pp. 254-268. ISBN 9783319929002 (doi: 10.1007/978-3-319-92901-9)

Simpson, R. and Storer, T. (2017) Experimenting with Realism in Software Engineering Team Projects: An Experience Report. In: 30th IEEE Conference on Software Engineering Education and Training (CSEE&T), Savannah, GA, USA, 7-9 Nov 2017, pp. 87-96. ISBN 9781538625361 (doi: 10.1109/CSEET.2017.23)

Alshammari, D., Singer, J. and Storer, T. (2017) Does CloudSim Accurately Model Micro Datacenters? In: IEEE International Conference on Cloud Computing (IEEE CLOUD 2017), Honolulu, HI, USA, 25-30 June 2017, pp. 705-709. (doi: 10.1109/CLOUD.2017.97)

Glisson, W. B. and Storer, T. (2013) Investigating Information Security Risks of Mobile Device Use within Organizations. In: 19th Americas Conference on Information Systems, Chicago, IL, USA, 15-17 Aug 2013,

Buchanan-Wollaston, J., Storer, T. and Glisson, W. (2013) A comparison of forensic toolkits and mass market data recovery applications. In: Ninth Annual IFIP WG 11.9 International Conference on Digital Forensics, National Center for Forensic Science Orlando, FL, USA, 28-30 Jan 2013,

Grispos, G., Glisson, W. and Storer, T. (2013) Using smartphones as a proxy for forensic evidence contained in cloud storage services. In: 46th Hawaii International Conference on System Sciences (HICSS-46), Grand Wailea, Maui, Hawaii, 7-10 Jan 2013, pp. 4910-4919. (doi: 10.1109/HICSS.2013.592)

Grispos, G., Glisson, W.B. and Storer, T. (2013) Cloud security challenges: investigating policies, standards, and guidelines in a Fortune 500 organization. In: 21st European Conference on Information Systems, Utrecht, The Netherlands, 5-8 Jun 2013,

Storer, T. , Marsh, S., Noël, S., Esfandiari, B., El-Khatib, K., Briggs, P., Renaud, K. and Bicakci, M.V. (2013) Encouraging second thoughts: obstructive user interfaces for raising security awareness. In: Privacy Security Trust 2013, Catalonia, Spain, 10-12 July 2013,

Storer, T. , Renaud, K. and Glisson, W. (2012) Patterns of information security postures for socio-technical systems and systems-of-systems. In: First International Workshop on Cyberpatterns, Abingdon, Oxfordshire, UK, 9-10 Jul 2012,

Raue, S., Johnson, C.W. and Storer, T. (2012) A social media audience sharing model for authorities to support effective crisis communication. In: System Safety 2012: The 7th IET Conference on Systems Safety and CyberSecurity, Edinburgh, UK, 15-18 Oct 2012,

Storer, T. , Glisson, W. and Grispos, G. (2010) Investigating information recovered from re-sold mobile. In: Privacy and Usability Methods Pow-wow (PUMP) 2010, Dundee, UK, 6 Sep 2010,

Lock, R., Storer, T. and Sommerville, I. (2009) Responsibility modelling for risk analysis. In: ESREL 2009 Annual Conference, Prague, Czech Republic, 7-10 Sep 2009,

Sommerville, I., Lock, R., Storer, T. and Dobson, J. (2009) Deriving Information Requirements from Responsibility Models. In: Advanced Information Systems Engineering, 21st International Conference, CAiSE 2009, Amsterdam, The Netherlands, 8-12 Jun 2009, pp. 515-529. (doi: 10.1007/978-3-642-02144-2_40)

Storer, T. and Lock, R. (2009) Accuracy: The fundamental requirement for voting systems. In: The Third International Conference on Availability, Reliability and Security, ARES 2009, Fukuoka, Japan, 16-19 Mar 2009, pp. 374-379. ISBN 9781424435722 (doi: 10.1109/ARES.2009.133)

This list was generated on Thu Oct 3 13:42:19 2024 BST.

Supervision

  • Huang, Jinling
    Designing ICTs for Chronic Disease Self-Management Support

Research datasets

Jump to: 2022 | 2021
Number of items: 2.

2022

Alhamed, M. and Storer, T. (2022) JOSSE: A Software Development Effort Dataset Annotated with Expert Estimates. [Data Collection]

2021

Happer, C. , Storer, T. , Hoskins, A. and Alkharashi, A. (2021) Public trust and understanding of online content moderation, and its impacts on public discourse. [Data Collection]

This list was generated on Thu Oct 3 21:22:06 2024 BST.