default search action
Huseyin Dogan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]Berkan Oztas, Deniz Cetinkaya, Festus Adedoyin, Marcin Budka, Gökhan Aksu, Huseyin Dogan:
Transaction monitoring in anti-money laundering: A qualitative analysis and points of view from industry. Future Gener. Comput. Syst. 159: 161-171 (2024) - [j8]Eylem Thron, Shamal Faily, Huseyin Dogan, Martin Freer:
Human factors and cyber-security risks on the railway - the critical role played by signalling operations. Inf. Comput. Secur. 32(2): 236-263 (2024) - [c60]Huseyin Dogan, Stephen Giff, Renee Barsoum:
User Experience Research: Point of View Playbook. CHI Extended Abstracts 2024: 537:1-537:7 - [c59]Nigel Davies, Huseyin Dogan, Duncan Ki-Aries, Nan Jiang, Chris Williams:
Foundations for Modelling Conscientious Attacking in Electromagnetic Cyberspace. CSR 2024: 726-731 - [c58]Bhausaheb Ashok Botre, Paul Whittington, Huseyin Dogan:
A Systematic Technical Review and Architecture of Smart Power Wheelchair Manoeuvring for People with Disabilities and the Elderly: A perspective from Human Computer Interaction and Shared Control Systems. PETRA 2024 - [c57]Fatima A. Muazu, Festus Adedoyin, Huseyin Dogan, Nicholas B. Mavengere, Paul Whittington:
The use of mobile learning in special education needs and disabilities (SEND) settings: state-of-the-art classification of studies. PETRA 2024 - [c56]Paul Whittington, Huseyin Dogan, Joshua Tarun Phillips, Harry Phillips, Izzy Pochin:
Communicating reasonable adjustments to improve accessibility of patient services. PETRA 2024 - 2023
- [c55]Berkan Oztas, Deniz Cetinkaya, Festus Fatai Adedoyin, Marcin Budka, Huseyin Dogan, Gökhan Aksu:
Perspectives from Experts on Developing Transaction Monitoring Methods for Anti-Money Laundering. ICEBE 2023: 39-46 - [c54]Berkan Oztas, Deniz Cetinkaya, Festus Fatai Adedoyin, Marcin Budka, Huseyin Dogan, Gökhan Aksu:
Enhancing Anti-Money Laundering: Development of a Synthetic Transaction Monitoring Dataset. ICEBE 2023: 47-54 - [c53]Paul Whittington, Huseyin Dogan:
Authentibility Pass: An Accessible Authentication Gateway for People with Reduced Abilities. ICEBE 2023: 155-162 - [c52]Paul Whittington, Huseyin Dogan, Nan Jiang, Ruijie Wang, Chris Porter:
Post Proceedings of the Interacting with Assistive Technology (IATech) Workshop. INTERACT Workshops (2) 2023: 249-256 - [c51]Paul Whittington, Huseyin Dogan, Nan Jiang:
EduAbility: Provision of Assistive Technology Awareness and Training. INTERACT Workshops (2) 2023: 267-271 - [c50]Paul Whittington, Huseyin Dogan, Nan Jiang:
Interacting with Assistive Technology (IATech) Workshop. INTERACT (4) 2023: 650-656 - 2022
- [j7]Duncan Ki-Aries, Shamal Faily, Huseyin Dogan, Christopher Williams:
Assessing system of systems information security risk with OASoSIS. Comput. Secur. 117: 102690 (2022) - [c49]Paul Whittington, Huseyin Dogan, Keith Phalp, Joshua Tarun Phillips:
Health Ability Pass: An Accessible Healthcare Gateway for Patients with Disabilities. ICEBE 2022: 282-287 - 2021
- [c48]Amna Altaf, Shamal Faily, Huseyin Dogan, Alexios Mylonas, Eylem Thron:
Use-Case Informed Task Analysis for Secure and Usable Design Solutions in Rail. CRITIS 2021: 168-185 - [c47]Amna Altaf, Shamal Faily, Huseyin Dogan, Eylem Thron, Alexios Mylonas:
Integrated Design Framework for Facilitating Systems-Theoretic Process Analysis. CyberICPS/SECPRE/ADIoT/SPOSE/CPS4CIP/CDT&SECOMANE@ESORICS 2021: 58-73 - [c46]Mohamed Altaher Ben Naseir, Huseyin Dogan, Edward Apeh:
Assessment of National Cybersecurity Capacity for Countries in a Transitional Phase: The Spring Land Case Study. MMBD/MLIS 2021: 144-153 - 2020
- [j6]Afrah Umran Alrubaee, Deniz Cetinkaya, Gernot Armin Liebchen, Huseyin Dogan:
A Process Model for Component-Based Model-Driven Software Development. Inf. 11(6): 302 (2020) - [c45]Charlie Cross, Deniz Cetinkaya, Huseyin Dogan:
Transforming Diagrams' Semantics to Text for Visually Impaired. HCI (20) 2020: 339-350 - [c44]Connor Corbin, Deniz Cetinkaya, Huseyin Dogan:
Design and Development of a Web Extension to Help Facilitate the Learning of a Foreign Language. HCI (43) 2020: 345-364 - [c43]Mohamed Altaher Ben Naseir, Huseyin Dogan, Edward Apeh, Raian Ali:
National Cybersecurity Capacity Building Framework for Countries in a Transitional Phase. ICEIS (2) 2020: 841-849
2010 – 2019
- 2019
- [j5]Kyle Boyd, Raymond R. Bond, Attila Vertesi, Huseyin Dogan, Justin Magee:
How People Judge the Usability of a Desktop Graphic User Interface at Different Time Points: Is there Evidence for Memory Decay, Recall Bias or Temporal Bias? Interact. Comput. 31(2): 221-230 (2019) - [c42]Amna Altaf, Shamal Faily, Huseyin Dogan, Alexios Mylonas, Eylem Thron:
Identifying Safety and Human Factors Issues in Rail Using IRIS and CAIRIS. CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS 2019: 98-107 - [c41]Gareth Veale, Huseyin Dogan, Jane Murphy:
Development and Usability Evaluation of a Nutrition and Lifestyle Guidance Application for People Living with and Beyond Cancer. HCI (20) 2019: 337-347 - [c40]Matthew Corner, Huseyin Dogan, Alexios Mylonas, Francis Djabri:
A Usability Evaluation of Privacy Add-ons for Web Browsers. HCI (21) 2019: 442-458 - [c39]Saleh Alamro, Huseyin Dogan, Raian Ali, Keith Phalp:
Template-Driven Documentation for Enterprise Recruitment Best Practices. ICEIS (1) 2019: 238-248 - [c38]Mohamed Altaher Ben Naseir, Huseyin Dogan, Edward Apeh, Christopher Richardson, Raian Ali:
Contextualising the National Cyber Security Capacity in an Unstable Environment: A Spring Land Case Study. WorldCIST (1) 2019: 373-382 - [i1]Paul Whittington, Huseyin Dogan, Nan Jiang, Keith Phalp:
The development and evaluation of the SmartAbility Android Application to detect users' abilities. CoRR abs/1904.06138 (2019) - 2018
- [j4]Saleh Alamro, Huseyin Dogan, Deniz Cetinkaya, Nan Jiang, Keith Phalp:
Conceptualising and Modelling E-Recruitment Process for Enterprises through a Problem Oriented Approach. Inf. 9(11): 269 (2018) - [c37]Saleh Alamro, Huseyin Dogan, Deniz Cetinkaya, Nan Jiang:
Problem-Oriented Conceptual Model and Ontology for Enterprise e-Recruitment. ICEIS (2) 2018: 280-289 - [c36]Amen Alrobai, Huseyin Dogan, Keith Phalp, Raian Ali:
Building Online Platforms for Peer Support Groups as a Persuasive Behavior Change Technique. PERSUASIVE 2018: 70-83 - [c35]Duncan Ki-Aries, Shamal Faily, Huseyin Dogan, Christopher Williams:
Assessing System of Systems Security Risk and Requirements with OASoSIS. ESPRE@RE 2018: 14-20 - [c34]Jeremy A. Stone, Neetesh Saxena, Huseyin Dogan:
Systematic Analysis: Resistance to Traffic Analysis Attacks in Tor System for Critical Infrastructures. SMC 2018: 2832-2837 - [c33]Botao Fan, Jianbing Ma, Nan Jiang, Huseyin Dogan, Raian Ali:
A Rule Based Reasoning System for Initiating Passive ADAS Warnings Without Driving Distraction Through an Ontological Approach. SMC 2018: 3511-3517 - [c32]Duncan Ki-Aries, Shamal Faily, Huseyin Dogan, Christopher Williams:
System of Systems Characterisation assisting Security Risk Assessment. SoSE 2018: 485-492 - 2017
- [j3]Paul Whittington, Huseyin Dogan:
SmartPowerchair: Characterization and Usability of a Pervasive System of Systems. IEEE Trans. Hum. Mach. Syst. 47(4): 500-510 (2017) - [c31]Nan Jiang, Huseyin Dogan, Feng Tian:
Designing Mobile Friendly CAPTCHAs: An Exploratory Study. BCS HCI 2017 - [c30]Jodie Ward, Huseyin Dogan, Edward Apeh, Alexios Mylonas, Vasilios Katos:
Using Human Factor Approaches to an Organisation's Bring Your Own Device Scheme. HCI (22) 2017: 396-413 - [c29]Harrison South, Martin Taylor, Huseyin Dogan, Nan Jiang:
Digitising a medical clerking system with multimodal interaction support. ICMI 2017: 238-242 - [c28]Duncan Ki-Aries, Shamal Faily, Huseyin Dogan, Christopher Williams:
Re-framing "the AMN": A case study eliciting and modelling a System of Systems using the Afghan Mission Network. RCIS 2017: 103-108 - [c27]Duncan Ki-Aries, Huseyin Dogan, Shamal Faily, Paul Whittington, Christopher Williams:
From Requirements to Operation: Components for Risk Assessment in a Pervasive System of Systems. RE Workshops 2017: 83-89 - 2016
- [c26]Stephen Ambore, Christopher Richardson, Huseyin Dogan, Edward Apeh, David Osselton:
A "Soft" Approach to Analysing Mobile Financial Services Socio-Technical Systems. BCS HCI 2016 - [c25]Hamid Bouchachia, Huseyin Dogan, Nan Jiang, Stephen Giff:
Human-Centred Design for Intelligent Environments. BCS HCI 2016 - [c24]Stephen Giff, Huseyin Dogan:
UX Research is Dead. Long live UX Research! BCS HCI 2016 - [c23]Brandon J. S. Scott, Huseyin Dogan, Nan Jiang:
Examining the Effects of Lighting Effects on Peripheral Devices for Visual User Notifications. BCS HCI 2016 - [c22]Helen Thackray, John McAlaney, Huseyin Dogan, Jacqui Taylor, Christopher Richardson:
Social Psychology: An under-used tool in Cybersecurity. BCS HCI 2016 - [c21]Paul Whittington, Huseyin Dogan:
A SmartDisability Framework: Enhancing User Interaction. BCS HCI 2016 - [c20]Amen Alrobai, John McAlaney, Huseyin Dogan, Keith Phalp, Raian Ali:
Exploring the Requirements and Design of Persuasive Intervention Technology to Combat Digital Addiction. HCSE/HESSD 2016: 130-150 - [c19]Paul Whittington, Huseyin Dogan:
SmartDisability: A smart system of systems approach to disability. SoSE 2016: 1-6 - [e1]Shamal Faily, Nan Jiang, Huseyin Dogan, Jacqui Taylor:
HCI 2016 - Fusion! Proceedings of the 30th International BCS Human Computer Interaction Conference, BCS HCI 2016, Bournemouth University, Poole, UK, 11-15 July 2016. Workshops in Computing, BCS 2016 [contents] - 2015
- [c18]Nan Jiang, Huseyin Dogan:
A gesture-based CAPTCHA design supporting mobile devices. BCS HCI 2015: 202-207 - [c17]Saleh Alamro, Huseyin Dogan, Keith Phalp:
Forming Enterprise Recruitment Pattern Based on Problem-Oriented Conceptual Model. CENTERIS/ProjMAN/HCist 2015: 298-305 - [c16]Paul Whittington, Huseyin Dogan, Keith Phalp:
Evaluating the Usability of an Automated Transport and Retrieval System. PECCS 2015: 59-66 - [c15]Paul Whittington, Huseyin Dogan:
SmartPowerchair: A pervasive system of systems. SoSE 2015: 244-249 - 2014
- [j2]Huseyin Dogan, Vishal Barot, Michael Henshaw, Carys E. Siemieniuch, Murray A. Sinclair:
Systems of systems engineering thesaurus approach: from concept to realisation. Int. J. Syst. Syst. Eng. 5(3): 228-247 (2014) - [c14]Nan Jiang, Huseyin Dogan:
CrowdHiLite: A Peer Review Service to Support Serious Reading on the Screen. BCS HCI 2014 - [c13]Ross Fenning, Huseyin Dogan, Keith Phalp:
Applicability of SSM and UML for Designing a Search Application for the British Broadcasting Corporation (BBC). BMMDS/EMMSAD 2014: 472-486 - [c12]Saleh Alamro, Huseyin Dogan, Keith Phalp:
E-Military Recruitment: A Conceptual Model for Contextualizing the Problem Domain. ISD 2014 - [c11]Amen Alrobai, Huseyin Dogan:
Requirements Engineering For ADDICTion-Aware Software (E-ADDICT). REFSQ Workshops 2014: 46-52 - [c10]Amen Alrobai, Huseyin Dogan:
Digital Addiction Ontology for Social Networking Systems. SocInfo Workshops 2014: 167-175 - 2013
- [c9]Raian Ali, Nan Jiang, Huseyin Dogan:
Socially-Augmented Software: Empowering Software Operation Through Social Contacts. CGC 2013: 404-409 - [c8]Cornelius Ncube, Soo Ling Lim, Huseyin Dogan:
Identifying top challenges for international research on requirements engineering for systems of systems engineering. RE 2013: 342-344 - [c7]Huseyin Dogan, Cornelius Ncube, Soo Ling Lim, Michael Henshaw, Carys E. Siemieniuch, Murray A. Sinclair, Vishal Barot, Sharon A. Henson, Mo M. Jamshidi, Daniel DeLaurentis:
Economic and Societal Significance of the Systems of Systems Research Agenda. SMC 2013: 1715-1720 - [c6]Vishal Barot, Michael Henshaw, Carys E. Siemieniuch, Huseyin Dogan:
Design of a web-based thesaurus for Systems of Systems Engineering. SoSE 2013: 7-12 - [c5]Huseyin Dogan, Vishal Barot, Michael Henshaw, Carys E. Siemieniuch:
Formalisation and mapping of terminologies for Systems of Systems Engineering thesaurus. SoSE 2013: 46-51 - [c4]Sharon A. Henson, Michael J. de C. Henshaw, Vishal Barot, Carys E. Siemieniuch, Murray A. Sinclair, Mo M. Jamshidi, Huseyin Dogan, Soo Ling Lim, Cornelius Ncube, Daniel DeLaurentis:
Towards a Systems of Systems Engineering EU Strategic Research Agenda. SoSE 2013: 99-104 - 2011
- [j1]Huseyin Dogan, Michael J. de C. Henshaw, Gillian Ragsdell:
The Risk of Information Management Without Knowledge Management: A Case Study. J. Inf. Knowl. Manag. 10(4): 393-408 (2011) - [c3]Huseyin Dogan, Sofia Ahlberg Pilfold, Michael Henshaw:
The role of human factors in addressing Systems of Systems complexity. SMC 2011: 1244-1249 - 2010
- [c2]Huseyin Dogan, Michael J. de C. Henshaw:
A conceptual approach to support through-life business transformation in an aerospace and defence context. SoSE 2010: 1-6
2000 – 2009
- 2009
- [c1]Huseyin Dogan, Michael Henshaw, Esmond Neil Urwin:
A 'Soft' Approach to TLM Requirements Capture to Support Through-Life Management. KSEM 2009: 458-469
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-10 21:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint