Ben Shreeve
Cited by
Cited by
Requirements fixation
R Mohanani, P Ralph, B Shreeve
Proceedings of the 36th international conference on software engineering …, 2014
The Shadow Warriors: In the no man’s land between industrial control systems and enterprise IT systems
A Zanutto, B Shreeve, K Follis, JS Busby, A Rashid
USENIX Association, 2017
The best laid plans or lack thereof: Security decision-making of different stakeholder groups
B Shreeve, J Hallett, M Edwards, KM Ramokapane, R Atkins, A Rashid
IEEE Transactions on Software Engineering 48 (5), 1515-1528, 2020
“Do this! Do that!, And nothing will happen” Do specifications lead to securely stored passwords?
J Hallett, N Patnaik, B Shreeve, A Rashid
2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE …, 2021
“So if Mr Blue Head here clicks the link...” Risk Thinking in Cyber Security Decision Making
B Shreeve, J Hallett, M Edwards, P Anthonysamy, S Frey, A Rashid
ACM Transactions on Privacy and Security (TOPS) 24 (1), 1-29, 2020
The United Kingdom’s cyber security degree certification program: a cyber security body of knowledge case study
L Nautiyal, A Rashid, J Hallett, B Shreeve, K Michael, E Chris, ...
IEEE Security & Privacy 20 (1), 87-95, 2022
Geographically distributed sensemaking: developing understanding in forum-based software development teams
B Shreeve, P Ralph, P Sawyer, P Stacey
2015 IEEE/ACM 8th International Workshop on Cooperative and Human Aspects of …, 2015
Making sense of the unknown: How managers make cyber security decisions
B Shreeve, C Gralha, A Rashid, J Araujo, M Goulão
ACM Transactions on Software Engineering and Methodology, 2022
CreativeTeams: Exploring the creative performance of co-located and virtual teams
BO Shreeve
PQDT-Global, 2018
Lego, cybersecurity and other animals
S Frey, M Pinto-Albuquerque, B Shreeve, A Rashid
The UK’s Cyber Security Degree Certification Programme: A CyBOK Case Study
L Nautiyal, A Rashid, J Hallett, B Shreeve
The system can't perform the operation now. Try again later.
Articles 1–11