Bashar Nuseibeh

Bashar Nuseibeh
University of Limerick | UL · LERO - The Irish Software Research Centre

About

399
Publications
86,302
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
14,117
Citations
Citations since 2016
122 Research Items
4373 Citations
20162017201820192020202120220100200300400500600
20162017201820192020202120220100200300400500600
20162017201820192020202120220100200300400500600
20162017201820192020202120220100200300400500600
Introduction
Skills and Expertise

Publications

Publications (399)
Article
Cyberattacks against Industrial Control Systems (ICS) can have harmful physical impacts. Investigating such attacks can be difficult, as evidence could be lost to physical damage. This is especially true with stealthy attacks; i.e., attacks that can evade detection. In this paper, we aim to engineer Forensic Readiness (FR) in safety-critical, geogr...
Conference Paper
Full-text available
Kindness can boost happiness and wellbeing. It can benefit individuals (e.g., increasing resilience) as well as society (e.g., increasing trust). With digital technology permeating our daily lives, there are increasing opportunities for such technology to enable, mediate, and amplify kindness in society. In this paper, we propose kind computing, a...
Article
Full-text available
Activity recognition using wearable sensors has become essential for a variety of applications. Tri-axial accelerometers are the most widely used sensor for activity recognition. Although various features have been used to capture patterns and classify the accelerometer signals to recognise activities, there is no consensus on the best features to...
Article
The pressure on software developers to produce secure software has never been greater. But what does security look like in environments that don’t produce security-critical software? In answer to this question, this multi-sited ethnographic study characterises security episodes and identifies five typical behaviors in software development. Using th...
Article
Full-text available
Supply chain fraud involving counterfeit or adulterated products presents threats to human health and safety. Quality Inspection is a key fraud mitigation tool where inspection planning involves allocating inspection resources across geographically dispersed assets considering both the cost and value of the inspection. I4.0 environments pose furthe...
Preprint
BACKGROUND The COVID-19 pandemic impacted older adults' social connections and increased loneliness, but also led to increased technology adoption, providing new opportunities to develop technology interventions to meet their social needs. Existing off the shelf social connection platforms do not contain facilities designed to break the cognitive c...
Preprint
Full-text available
As autonomous systems are becoming part of our daily lives, ensuring their trustworthiness is crucial. There are a number of techniques for demonstrating trustworthiness. Common to all these techniques is the need to articulate specifications. In this paper, we take a broad view of specification, concentrating on top-level requirements including bu...
Conference Paper
Full-text available
Article
Background: The global population is aging, leading to shifts in health care needs. In addition to developing technology to support physical health, there is an increasing recognition of the need to consider how technology can support emotional health. This raises the question of how to design devices that older adults can interact with to log the...
Conference Paper
Full-text available
Background: Recent studies show that secure coding is about not only technical requirements but also developers' behaviour. Objective: To understand the influence of socio-technical contexts on how developers attend to and engage with security in code, software engineering researchers collaborated with social psychologists on a psychologically-inf...
Article
Full-text available
It is imperative for all stakeholders that digital forensics investigations produce reliable results to ensure the field delivers a positive contribution to the pursuit of justice across the globe. Some aspects of these investigations are inevitably contingent on trust, however this is not always explicitly considered or critically evaluated. Erron...
Article
Full-text available
Objective This study aims to gather public opinion on the Irish “COVID Tracker” digital contact tracing (DCT) App, with particular focus on App usage, usability, usefulness, technological issues encountered, and potential changes to the App. Methods A 35-item online questionnaire was deployed for 10 days in October 2020, 3 months after the launch...
Preprint
Full-text available
It is imperative for all stakeholders that digital forensics investigations produce reliable results to ensure the field delivers a positive contribution to the pursuit of justice across the globe. Some aspects of these investigations are inevitably contingent on trust, however this is not always explicitly considered or critically evaluated. Erron...
Article
Full-text available
The COVID-19 pandemic is worsening loneliness for many older people through the challenges it poses in engaging with their social worlds. Digital technology has been offered as a potential aid, however, many popular digital tools have not been designed to address the needs of older adults during times of limited contact. We propose that the Social...
Article
Full-text available
Privacy is an essential consideration when designing interactive systems for humans. However, at a time when interactive technologies are increasingly targeted at non-human animals and deployed within multispecies contexts, the question arises as to whether we should extend privacy considerations to other animals. To address this question, we revis...
Article
Full-text available
Attacks on industrial control systems (ICSs) can lead to significant physical damage. While off-line safety and security assessments can provide insight into vulnerable system components, they may not account for stealthy attacks designed to evade anomaly detectors during long operational transients. In this article, we propose a predictive online...
Article
Full-text available
Stealthy attacks on Industrial Control Systems can cause significant damage. In this paper, instead of focusing on the detection of stealthy attacks, we aim to provide early warnings to operators, in order to avoid physical damage and preserve in advance data that may serve as an evidence during an investigation. We propose a framework to provide g...
Conference Paper
The effective functioning of society is increasingly reliant on supply chains which are susceptible to fraud, such as the distribution of adulterated products. Inspection is a key tool for mitigating fraud, however it has traditionally been constrained by physical characteristics of supply chains such as their size and geographical distribution. Th...
Article
Full-text available
Despite the availability of various methods and tools to facilitate secure coding, developers continue to write code that contains common vulnerabilities. It is important to understand why technological advances do not sufficiently facilitate developers in writing secure code. In order to widen our understanding of developers' behaviour, we conside...
Preprint
Full-text available
Older adults face significant challenges in regards to the various stereotypes associated with ageing, which have consequences for their mental health and wellbeing. The COVID-19 pandemic has heightened these age-based stereotypes due to older adults' proportionally higher vulnerability to the virus. The present research explored how the pandemic h...
Preprint
Full-text available
Stealthy attacks on Industrial Control Systems can cause significant damage while evading detection. In this paper, instead of focusing on the detection of stealthy attacks, we aim to provide early warnings to operators, in order to avoid physical damage and preserve in advance data that may serve as an evidence during an investigation. We propose...
Article
Full-text available
Background: Digital contact tracing apps have the potential to augment contact tracing systems and disrupt COVID-19 transmission by rapidly identifying secondary cases prior to the onset of infectiousness and linking them into a system of quarantine, testing, and health care worker case management. The international experience of digital contact tr...
Preprint
Full-text available
Attacks on Industrial Control Systems (ICS) can lead to significant physical damage. While offline safety and security assessments can provide insight into vulnerable system components, they may not account for stealthy attacks designed to evade anomaly detectors during long operational transients. In this paper, we propose a predictive online moni...
Preprint
Full-text available
BACKGROUND The silent transmission of COVID-19 has led to an exponential growth of fatal infections. With over 3 million deaths world-wide, the need to control and stem transmission has never been more critical. New COVID-19 vaccines offer hope. However, administration timelines, long-term protection, and effectiveness against variants are still un...
Preprint
Full-text available
The COVID-19 pandemic is increasing older people's existing challenges in engaging with their physical and social worlds, and is thereby likely to worsen their loneliness. Digital technology has been offered as a potential aid for social connectedness during social distancing/isolation. However, many popular digital communication tools have not bee...
Article
Full-text available
Eyewitnesses to crimes sometimes search for a culprit on social media before viewing a police lineup, but it is not known whether this affects subsequent lineup identification accuracy. The present online study was conducted to address this. Two hundred and eighty-five participants viewed a mock crime video, and after a 15–20 min delay either (i) v...
Preprint
Full-text available
The COVID-19 pandemic is increasing older people's existing challenges in engaging with their physical and social worlds, and is thereby likely to worsen their loneliness. Digital technology has been offered as a potential aid for social connectedness during social distancing/isolation. However, many popular digital communication tools have not bee...
Preprint
Full-text available
Software systems are increasingly making decisions on behalf of humans, raising concerns about the fairness of such decisions. Such concerns are usually attributed to flaws in algorithmic design or biased data, but we argue that they are often the result of a lack of explicit specification of fairness requirements. However, such requirements are ch...
Preprint
BACKGROUND Novel software applications (“Apps”) that can potentially simplify the laborious work of manual contact tracing during the ongoing COVID-19 pandemic are a tempting prospect. Given this potential, many countries have designed, developed and deployed Apps before their efficacy has been established. The Irish health service launched the “CO...
Article
Full-text available
Background Digital Contact Tracing is seen as a key tool in reducing the propagation of Covid-19. But it requires high uptake and continued participation across the population to be effective. To achieve sufficient uptake/participation, health authorities should address, and thus be aware of, user concerns. Aim This work manually analyzes user rev...
Article
Perceptions of police trustworthiness are linked to citizens’ willingness to cooperate with police. Trust can be fostered by introducing accountability mechanisms, or by increasing a shared police/citizen identity, both which can be achieved digitally. Digital mechanisms can also be designed to safeguard, engage, reassure, inform, and empower diver...
Preprint
Full-text available
BACKGROUND Digital contact tracing apps (DCTAs) have the potential to augment contact tracing systems and disrupt Coronavirus 2019 (COVID-19) transmission. Despite many countries deploying DCTAs, few have disrupted COVID-19 transmission sufficiently to avoid the most restrictive social distancing measures. OBJECTIVE Our aim was to describe and pro...
Article
The emergence of ubiquitous computing (UbiComp) environments has increased the risk of undesired access to individuals’ physical space or their information, anytime and anywhere, raising potentially serious privacy concerns. Individuals lack awareness and control of the vulnerabilities in everyday contexts and need support and care in regulating di...
Conference Paper
Contact Tracing (CT) is seen as a key tool in reducing the propagation of viruses, such as Covid-19. Given near ubiquitous societal usage of mobile devices, governments globally are choosing to augment manual CT with CT applications (CTAs) on smart phones. While a plethora of solutions have been spawned, their overall effectiveness is based on majo...
Preprint
Full-text available
Digital Contact Tracing (DCT) is seen as a key tool in reducing the propagation of viruses such as Covid-19, but it requires uptake and participation in the technology across a large proportion of the population to be effective. While we observe the pervasive uptake of mobile device usage across our society, the installation and usage of contact tra...
Article
Full-text available
Background: Contact tracing remains a critical part of controlling COVID-19 spread. Many countries have developed novel software applications (Apps) in an effort to augment traditional contact tracing methods. Aim: Conduct a national survey of the Irish population to examine barriers and levers to the use of a contact tracing App. Methods: Adu...
Article
Problems come up during software development all the time. When developers hit these bumps, situations can be surprising and new, and they must figure out what — if anything — has gone wrong. Error handling often resolves small, immediate concerns, however, findings from three ethnographically-informed studies suggest that the way developers experien...
Conference Paper
Full-text available
Community policing faces a combination of new challenges and opportunities due to both citizens and police adopting new digital technologies. However, there is limited scholarly work providing evidence for how technologies assist citizens' interactions with the police. This paper reports preliminary findings from interviews with 13 participants, bo...
Preprint
Full-text available
Background: Contact tracing remains a critical part of controlling the spread of COVID-19. Many countries have developed novel software applications (Apps) in an effort to augment traditional contact tracing methods. Aim: To conduct a national survey of the Irish population to examine barriers and levers to the use of a contact tracing App. Methods...
Preprint
Full-text available
Perceptions of police trustworthiness are linked to citizens' willingness to cooperate with police. Trust can be fostered by introducing accountability mechanisms, or by increasing a shared police/citizen identity, both which can be achieved digitally. Digital mechanisms can also be designed to safeguard, engage, reassure, inform, and empower diver...
Preprint
Full-text available
Given concerns about mental health during periods of Covid-19 lockdown, it important to understand how engagement with online Covid-19 related material can affect mood. In the UK and Ireland, online community support initiatives (OCSIs) have emerged to help people manage their lives. Yet, little is known about how people engaged with these or wheth...
Conference Paper
Full-text available
Research has established the wide variety of security failures in mobile apps, their consequences, and how app developers introduce or exacerbate them. What is not well known is why developers do so—what is the rationale underpinning the decisions they make which eventually strengthen or weaken app security? This is all the more complicated in mode...
Conference Paper
Full-text available
We explore a dataset of app developer reasoning to better understand the reasons that may inadvertently promote or demote app developers' prioritization of security. We identify a number of reasons: caring vs. fear of users, the impact of norms, and notions of 'otherness' and 'self' in terms of belonging to groups. Based on our preliminary ndings,...
Article
Cyber-physical systems (CPSs) are part of many critical infrastructures such as industrial automation and transportation systems. Thus, security incidents targeting CPSs can have disruptive consequences to assets and people. As incidents tend to re-occur, sharing knowledge about these incidents can help organizations be more prepared to prevent, mi...
Conference Paper
The global population is ageing, leading to shifts in health- care needs. Home healthcare monitoring systems currently focus on physical health, but there is an increasing recogni- tion that psychological wellbeing also needs support. This raises the question of how to design devices that older adults can interact with to log their feelings. We des...
Preprint
Many software systems have become too large and complex to be managed efficiently by human administrators, particularly when they operate in uncertain and dynamic environments and require frequent changes. Requirements-driven adaptation techniques have been proposed to endow systems with the necessary means to autonomously decide ways to satisfy th...
Preprint
Full-text available
Systems-of-systems are formed by the composition of independently created software components. These components are designed to satisfy their individual requirements, rather than the global requirements of the systems-of-systems. We refer to components that cannot be adapted to meet both individual and global requirements as "defiant" components. I...
Article
As software-intensive digital systems become an integral part of modern life, ensuring that these systems are developed to satisfy security and privacy requirements is an increasingly important societal concern. Integrating security into software development involves more than learning security principles or applying techniques. Security in practic...
Article
Full-text available
Unmanned Aerial Vehicles (UAVs), or drones, are increasingly expected to operate in spaces populated by humans while avoiding injury to people or damaging property. However, incidents and accidents can, and increasingly do, happen. Traditional investigations of aircraft incidents require on-board flight data recorders (FDRs); however, these physica...
Article
Full-text available
Internet of Things (IoT) applications typically collect and analyse personal data that can be used to derive sensitive information about individuals. However, thus far, privacy concerns have not been explicitly considered in software engineering processes when designing IoT applications. With the advent of behaviour driven security mechanisms, fail...
Article
Full-text available
The proliferation of smart spaces, such as smart buildings, is increasing opportunities for offenders to exploit the interplay between cyber and physical components, in order to trigger security incidents. Organizations are obliged to report security incidents to comply with recent data protection regulations. Organizations can also use incident re...