Bashar Nuseibeh
YOU?
Author Swipe
View article: Intersecting social identity and drone use in humanitarian contexts: Psychological insights for legal decisions and responsible innovation
Intersecting social identity and drone use in humanitarian contexts: Psychological insights for legal decisions and responsible innovation Open
While the technical and ethical challenges of using drones in Search-and-Rescue operations for transnationally displaced individuals have been explored, how drone footage can shape psychological processes at play and impact post-rescue leg…
View article: Diagnosing Unknown Attacks in Smart Homes Using Abductive Reasoning
Diagnosing Unknown Attacks in Smart Homes Using Abductive Reasoning Open
Security attacks are rising, as evidenced by the number of reported vulnerabilities. Among them, unknown attacks, including new variants of existing attacks, technical blind spots or previously undiscovered attacks, challenge enduring secu…
View article: Meta-Modelling Kindness
Meta-Modelling Kindness Open
Kindness is a psycho-social phenomenon that is also recognized as an important pro-social behaviour. The use of digital technology provides opportunities to promote kindness in various ways, such as in social media campaigns and online com…
View article: The Rocky Road to Sustainable Security
The Rocky Road to Sustainable Security Open
In this column, we illustrate real-world scenarios in which modern systems cannot preserve security during operation. We examine the notion of sustainable security and discuss the challenges to engineering sustainably secure systems.
View article: Reflections on using the story completion method in designing tangible user interfaces
Reflections on using the story completion method in designing tangible user interfaces Open
There are many design techniques to support the co-design of tangible technologies. However, few of these design methods allow the involvement of users at scale and across diverse geographic locations. While popular in psychology, the stor…
View article: Infrastructural justice for responsible software engineering,
Infrastructural justice for responsible software engineering, Open
In recent years, we have seen many examples of software products unintentionally causing demonstrable harm. Many guidelines for ethical and responsible computing have been developed in response. Dominant approaches typically attribute liab…
View article: How Do People Use a Public Gratitude Platform in the Wild?
How Do People Use a Public Gratitude Platform in the Wild? Open
A plethora of psychological research suggests that gratitude interventions can improve individual well-being and prosocial behavior. However, most of the existing studies focus on gratitude interventions of individuals within controlled la…
View article: The IDEA of Us: An Identity-Aware Architecture for Autonomous Systems
The IDEA of Us: An Identity-Aware Architecture for Autonomous Systems Open
Autonomous systems, such as drones and rescue robots, are increasingly used during emergencies. They deliver services and provide situational awareness that facilitate emergency management and response. To do so, they need to interact and …
View article: Everything but Programming; Investigating Academics’ Perceptions of Embedded Soft Skills in Computer Science Undergraduate Education
Everything but Programming; Investigating Academics’ Perceptions of Embedded Soft Skills in Computer Science Undergraduate Education Open
Student employability is a key goal of a computer science undergraduate education. A soft skills gap has previously been reported between employer requirements and the skills graduates offer, suggesting that educators are inadequately prep…
View article: Software Vulnerabilities as Cognitive Blindspots; assessing the suitability of a dual processing theory of decision making for secure coding
Software Vulnerabilities as Cognitive Blindspots; assessing the suitability of a dual processing theory of decision making for secure coding Open
Security vulnerabilities are present in many software systems, putting those who entrust software with their data in harm’s way. Many vulnerabilities are avoidable since they are not new and are well-described. Despite this awareness, they…
View article: On Specifying for Trustworthiness
On Specifying for Trustworthiness Open
As autonomous systems increasingly become part of our lives, it is crucial to foster trust between humans and these systems, to ensure positive outcomes and mitigate harmful ones.
View article: Responsible Software Engineering: Requirements and Goals
Responsible Software Engineering: Requirements and Goals Open
In this chapter, we provide an introduction to the discipline of requirements engineering as part of the software engineering process. We indicate how to elicit, articulate, and organize the goals of complex software systems as an explicit…
View article: Introduction to Digital Humanism
Introduction to Digital Humanism Open
This open access textbook introduces and defines digital humanism from a diverse range of disciplines. Following the 2019 Vienna Manifesto, the book calls for a digital humanism that describes, analyzes, and, most importantly, influences t…
View article: What's in an undergraduate Computer Science Degree; Alumni perceptions about soft skills in careers
What's in an undergraduate Computer Science Degree; Alumni perceptions about soft skills in careers Open
Software engineering skills are broad and varied, encompassing not only technical abilities, but cognitive and social dimensions as well. Previous research establishes soft skills as being central for software engineering, e.g., teamwork, …
View article: “Are we in this together?”: embedding social identity detection in drones improves emergency coordination
“Are we in this together?”: embedding social identity detection in drones improves emergency coordination Open
Autonomous systems, such as drones, are critical for emergency mitigation, management, and recovery. They provide situational awareness and deliver communication services which effectively guide emergency responders’ decision making. This …
View article: Requirements for Designing Kind Spaces
Requirements for Designing Kind Spaces Open
Kindness is an important quality of human behavior, and the physical spaces in which people live, work, and interact can significantly influence the experience and expression of kindness. With the growing integration of digital technology …
View article: Security in Online Freelance Software Development: A case for Distributed Security Responsibility
Security in Online Freelance Software Development: A case for Distributed Security Responsibility Open
Secure software is a cornerstone to safe and resilient digital ecosystems. It offers strong foundation to protect users' sensitive data and guard against cyber-threats. The rapidly increasing landscape of digital economy has encouraged dev…
View article: Socio-Technical Resilience for Community Healthcare
Socio-Technical Resilience for Community Healthcare Open
Older adults at home frequently rely on ‘circles of support’ which range from relatives and neighbours, to the voluntary sector, social workers, paid carers, and medical professionals. Creating, maintaining, and coordinating these circles …
View article: Adaptive Observability for Forensic-Ready Microservice Systems
Adaptive Observability for Forensic-Ready Microservice Systems Open
Microservice-based applications may include multiple instances of microservices running on containerised infrastructures. These infrastructures pose challenges to digital investigations of security incidents because digital evidence can be…
View article: Sustainable Adaptive Security
Sustainable Adaptive Security Open
With software systems permeating our lives, we are entitled to expect that such systems are secure by design, and that such security endures throughout the use of these systems and their subsequent evolution. Although adaptive security sys…
View article: Values@Runtime: An Adaptive Framework for Operationalising Values
Values@Runtime: An Adaptive Framework for Operationalising Values Open
We present an adaptive framework to assist users in making more value-sensitive decisions during their (runtime) use of software. The framework enables users to (i) represent, instantiate, and monitor their values and behaviour; (ii) under…
View article: Accounting for socio-technical resilience in software engineering
Accounting for socio-technical resilience in software engineering Open
— Resilience engineering (RE) is most commonly applied at the organisational level, and has historically been associated with safety-critical industries such as nuclear, medical or aviation. This paper explores the application of RE framew…
View article: Security Thinking in Online Freelance Software Development
Security Thinking in Online Freelance Software Development Open
Online freelance software development (OFSD) is a significant part of the software industry and is a thriving online economy; a recent survey by Stack Overflow reported that nearly 15% are independent contractors, freelancers, or self-empl…
View article: Recognizing the known unknowns; the interaction between reflective thinking and optimism for uncertainty among software developer’s security perceptions
Recognizing the known unknowns; the interaction between reflective thinking and optimism for uncertainty among software developer’s security perceptions Open
Software development is a complex process requiring aspects of social, cognitive, and technical skills. Software engineers face high levels of uncertainty and risk during functional and security decision making. This preregistered study in…
View article: A Card-based Ideation Toolkit to Generate Designs for Tangible Privacy Management Tools
A Card-based Ideation Toolkit to Generate Designs for Tangible Privacy Management Tools Open
Effective privacy protection in dynamic UbiComp environments requires users to be able to manage their privacy seamlessly across diverse contexts. To support this, designers need to go beyond GUI-based interactions and utilise tangible and…
View article: Can you hear the ROAR of software security? How Responsibility, Optimism And Risk shape developers’ security perceptions
Can you hear the ROAR of software security? How Responsibility, Optimism And Risk shape developers’ security perceptions Open
How do software developers view issues of secure software development? Drawing upon psychological theories of social identity and cognitive processing, we engage with software engineers about security in their software to illustrate how se…