{"id":55,"date":"2015-11-19T20:06:25","date_gmt":"2015-11-19T20:06:25","guid":{"rendered":"https:\/\/cybersecurity.bournemouth.ac.uk\/?page_id=55"},"modified":"2025-10-26T01:21:30","modified_gmt":"2025-10-26T01:21:30","slug":"critical-infrastructure-specification-exemplars","status":"publish","type":"page","link":"https:\/\/cybersecurity.bournemouth.ac.uk\/?page_id=55","title":{"rendered":"Human-Centered Specification Exemplars"},"content":{"rendered":"<p><a href=\"https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2015\/11\/18-aug_bancis.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-56\" src=\"https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2015\/11\/18-aug_bancis-225x300.jpg\" alt=\"BANCIS\" width=\"225\" height=\"300\" \/><\/a><\/p>\n<p><strong>Overview<\/strong><br \/>\nMany practitioners and researchers designing technology for critical infrastructure have little visibility of the impact their innovation might on day-to-day operations. We are currently building \u2019specification exemplars\u2019 that capture the socio-technical nuances associated with different contexts of use in different forms of critical infrastructure. We are grounding these exemplars in empirical research collected in different critical infrastructures. Once complete, the exemplars will help product developers better understand the environments their solutions will be situated in.<\/p>\n<p><strong>Contacts<\/strong>: <a href=\"http:\/\/staffprofiles.bournemouth.ac.uk\/display\/sfaily\">Shamal Faily<\/a>, <a href=\"http:\/\/staffprofiles.bournemouth.ac.uk\/display\/vkatos\">Vasilis Katos<\/a><\/p>\n<p><strong>Collaborators:\u00a0<\/strong>\u00a0Athens University of Economics and Business<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview Many practitioners and researchers designing technology for critical infrastructure have little visibility of the impact their innovation might on day-to-day operations. We are currently building \u2019specification exemplars\u2019 that capture the socio-technical nuances associated with different contexts of use in different forms of critical infrastructure. We are grounding these exemplars in empirical research collected in [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":53,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"full-width-page.php","meta":{"inline_featured_image":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"_links":{"self":[{"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/pages\/55"}],"collection":[{"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=55"}],"version-history":[{"count":10,"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/pages\/55\/revisions"}],"predecessor-version":[{"id":1051,"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/pages\/55\/revisions\/1051"}],"up":[{"embeddable":true,"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/pages\/53"}],"wp:attachment":[{"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=55"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}