OU Profiles homepage Edit my profile User guide Accessibility Statement
Picture  of Arosha Bandara

Prof Arosha Bandara

Professor Of Software Engineering

School of Computing & Communications

arosha.bandara@open.ac.uk

Blog icon
Other icon

Biography

Professional biography

I am a Professor of Software Engineering at the Open University whose research addresses the practical problems associated with building and maintaining self-managing (adaptive) systems by combining rigorous formal techniques with concrete implementations and applications of those techniques. I completed my PhD at Imperial College London, UK in 2005, prior to which I worked as a senior software engineer at Sapient Corporation, USA.

During my career, I have published over 100 peer-reviewed papers which include 4 that won Best Paper awards.  My interdisciplinary research bridges software engineering with social psychology, business strategy, human-computer interaction, healthcare, and machine learning. As a result, I have contributed to advances that have impacted application domains that include online social networks, enterprise systems, policing, the internet of things and mobile applications. My teaching spans undergraduate and postgraduate curricula, specialising in software engineering and cyber security.  I am also an investigator on externally funded research projects (totalling >£6M) and was a member of the team that won the IET Innovation Award in Cyber Security (in 2017). 

Between Jan 2018 - Mar 2021, I was Head of the OU's School of Computing & Communications. In January 2024, I was appointed Associate Dean & Director of STEM Research for the Faculty of Science, Technology, Engineering & Mathematics.

You can engage with me on different social networks, including, LinkedIn and BlueSky.

Research interests

My research interests include:

  • Adaptive systems 
  • Analysis and refinement of policies for adaptive systems
  • Software engineering for adaptive systems
  • Adaptive security, privacy and online safety
  • Responsible software engineering

My research vision focusses on novel engineering approaches for adaptive software systems that allow ubiquitous digital technologies to be integrated into the ‘smart systems’ that enhance many aspects of our lives, from social interactions and education, to agriculture, health, policing and sustainable living. To be effective, these systems must be able to adapt and continue work in dynamic environments. My research ensures that the software at the heart of ‘smart systems’ can continuously satisfy dynamic requirements like performance, security, privacy, usability and online safety. I am also interested in how improving software engineering methods, processes, and tools can support responsible software engineering practice and improve the quality of the software products we build.

Some recent projects relevant to this research agenda include:

Teaching interests

I am interested in computer science education, and led the development of a massive open online course called Introduction to Cyber Security, which is delivered via Futurelearn. I also teach Software Engineering as part of the MSc in Computing programme.

Additionally, I have worked on studying the efficacy of visual programming approaches to teaching entry-level computer science.  I was part of the team that developed Sense, a unique ubiquitous computing experimentation kit that allows novice students to build computer programs that interact with the physical world and online information sources

Projects

Adaptive Information Security: Relating security requirements to design (QNRF)

The main objectives of this collaborative project are as follows. O1. Investigate notations and structures for modelling security requirements to protect assets from changing hazards in a dynamic environment O2. Develop forward-engineering and reverse-engineering techniques for design-time and run-time traceability between security design of the cloud service and requirements for information security O3. Investigate methods for adapting and validating the system design in the face of changing contexts, whilst providing assurance that the information security requirements are being met O4. Deploy practical mechanisms for demonstrate and validate the approach. These research objectives will be refined into a number of research questions including the following.  The notions of “anti-requirements”, and “harm to assets” have been shown to be useful when describing security requirements. Are these notions useful and sufficient when specifying requirements for adaptive information security? (O1)  How can requirements for adaptive information security be elicited? (O1)  What kinds of relationship between static (“designtime”) models and dynamic (run time) models can be used to support security analysis and adaptation? (O2)  To what extent and how traceability from requirements to implementation be reverse-engineering for existing software applications? (O2)  How can users monitor whether their requirements are being satisfied as the cloud services and applications evolve? (O3)  How can developers know to what extent their cloud services and applications meet the requirements of the users, perhaps after some changes have been introduced? (O3)  What is the critical infrastructure needed for these news assurance mechanism to work effectively in the cloud? What is the best way to visualise/notify users at the high level (O4)

Privacy Dynamics: Learning from the wisdom of groups (EPSRC)

We propose to investigate how individuals learn and benefit from their membership of social or functional groups, and how such learning can be automated and incorporated in modern mobile and ubiquitous technologies that increasingly pervade society.

Adaptive Security & Privacy (ERC)

With the prevalence of mobile computing devices and the increasing availability of pervasive services, ubiquitous computing (Ubicomp) is a reality for many people. This reality is generating opportunities for people to interact socially in new and richer ways, and to work more effectively in a variety of new environments. More generally, Ubicomp infrastructures – controlled by software – will determine users’ access to critical services. With these opportunities come higher risks of misuse by malicious agents. Therefore, the role and design of software for managing use and protecting against misuse is critical, and the engineering of software that is both functionally effective while safe guarding user assets from harm is a key challenge. Indeed the very nature of Ubicomp means that software must adapt to the changing needs of users and their environment, and, more critically, to the different threats to users’ security and privacy. ASAP proposes to radically re-conceptualise software engineering for Ubicomp in ways that are cognisant of the changing functional needs of users, of the changing threats to user assets, and of the changing relationships between them. We propose to deliver adaptive software capabilities for supporting users in managing their privacy requirements, and adaptive software capabilities to deliver secure software that underpin those requirements. A key novelty of our approach is its holistic treatment of security and human behaviour. To achieve this, it draws upon contributions from requirements engineering, security & privacy engineering, and human-computer interaction. Our aim is to contribute to software engineering that empowers and protects Ubicomp users. Underpinning our approach will be the development of representations of security and privacy problem structures that capture user requirements, the context in which those requirements arise, and the adaptive software that aims to meet those requirements.

Arabic-MOOC an Introduction to Cyber Security

To produce and deliver Arabic language versions of the Introduction to Cyber Security MOOC, to provide awareness level cyber security training covering specific topics of interest to learners in the Arab States of the Gulf.

Introduction to Information Security MOOC

To develop a short MOOC based on existing material in the TU100 module that covers topics relating to information security - i.e. undertanding information security threats, basic risk analysis, cryptography, network security, malware secruity and digital forensics.

Centre for Protecting Women Online

We live in cyber-physical-social spaces where lines between ‘online’ and ‘offline’ are increasingly blurred, but also where violence against women and girls (VAWG) thrives. It is therefore more important now than ever for interdisciplinary research and cross-sectoral dialogue to address this contemporary societal challenge. The Centre for Protecting Women online will be a vehicle for understanding and addressing challenges posed to women’s safety online through a novel, interdisciplinary and ambitious research agenda. E3 funding will support this expansion by combining cross-sectoral, collaborative outputs and interventions which inform law, policy, technology development, and practice to reduce online harms suffered by women and girls, minimise anti-social behaviours online whilst promoting pro-social behaviours and help build tech software that helps ensure accountability, credibility, and helps facilitate justice.

SAUSE: Secure, Adaptive, Usable Software Engineering

In the last decade, the role of software engineering has changed rapidly and radically. Globalisation and mobility of people and services, pervasive computing, and ubiquitous connectivity through the Internet have disrupted traditional software engineering boundaries and practices. People and services are no longer bound by physical locations. Computational devices are no longer bound to the devices that host them. Communication, in its broadest sense, is no longer bounded in time or place. The Software Engineering & Design (SEAD) group at the Open University (OU) is leading software engineering research in this new reality that requires a paradigm shift in the way software is developed and used. This platform grant will grow and sustain strategic, multi-disciplinary, crosscutting research activities that underpin the advances in software engineering required to build the pervasive and ubiquitous computing systems that will be tightly woven into the fabric of a complex and changing socio-technical world. In addition to sustaining and growing the SEAD group at the OU and supporting its continued collaboration with the Social Psychology research group at the University of Exeter, the SAUSE platform will also enable the group to have lasting impact across several application domains such as healthcare, aviation, policing, and sustainability. The grant will allow the team to enhance the existing partner networks in these areas and to develop impact pathways for their research, going beyond the scope and lifetime of individual research projects.

Citizen Forensics

The Citizen Forensics project reframes key challenges that underlie modern policing in a socio-technical world; a world instrumented with mobile and ubiquitous computing technologies, in which many citizens and communities live, work and play, but which must also manage threats to their wellbeing and their rights. The project aims to support a new engagement between authorities (such as the police) and communities of citizens in order to better investigate (and in the long term reduce) potential or actual threats to citizen security, safety, and privacy. This includes both empowering the police by opening up new ways of citizens providing data in ways that protect privacy and anonymity, and empowering citizens by using these new technologies to also hold the police to account. We will be harnessing many of the so-called Internet of Things, Smart City and Smart Home technologies to encourage and allow citizens to help the police collect and analyse disparate data to improve public safety at both local and ultimately national levels. This multidisciplinary investigation draws upon expertise in computing, policing, psychology and organisational theory. For more information, see https://www.citizenforensics.org/

STRETCH: Socio-Technical Resilience for Enhancing Targeted Community Healthcare

The aim of this project will be to build a dynamic and resilient socio-technical system that sustains care for people with chronic illnesses in old age. Its principle novelty will be the integration of human and technical resources into a single system that will have resilient care at its heart. Resilience will mean both social resilience and technical resilience. To deliver social resilience we will explore how technology can help to harness existing social support as well as building wider social capital around older people. To deliver technical resilience we will design systems that integrate existing technological capacity in novel configurations as well as integrating new sensing / Internet of Things capability. However, the key innovation will be that the integrated socio-technical system will allow for the interchange between human assets and technological assets in the delivery of a resilient care architecture for older people. The system will not seek to replace human resource with a technology derived alternative, but to harness the capacities of all elements of the system in a way that serves the needs of the older person. Sometimes the system will respond to need through mobilising human resources, at other times the same need could be met through technological capability. In that sense, the system will have the needs of the older person at its core.

Drone Identity

This EngageKTN project is investigating forensic-readiness requirements of unmanned aerial systems, to help identify causes of safety and security related air traffic incidents. Unmanned aerial vehicles (or drones) are increasingly creating challenges for managing the safety of aircraft that share the airspace with them. The collection and use of forensic data associated with drones and surrounding physical contexts is key to effective incident investigations. The research is focusing on the architecture and concept of operations for European unmanned traffic management, and the ability to preserve such vital information as evidence for forensic investigations. The team of the project include Dr. Yijun Yu (PI), Mr. Danny Barthaud (Research Software Engineer), and Prof. Bashar Nuseibeh, Prof. Blaine Price, Prof. Andrea Zisman, Prof. Arosha Bandara at The Open University, and Dr. Anthony P. Rushton, Dr. David L. Bush, and Dr. George S. Koudis at NATS. The project URL is at https://droneidentity.eu.

Publications

Book

Engineering Adaptive Software Systems (2019)

Book Chapter

Assessing Security and Privacy Behavioural Risks for Self-Protection Systems (2019)

Design and Engineering of Adaptive Software Systems (2019)

Parallel Adaptation of Multiple Service Composition Instances (2019)

Data Privacy: Users’ Thoughts on Quantified Self Personal Data (2018)

Security patterns: comparing modeling approaches (2010)

Policy technologies for security management in coalition networks (2010)

Policy based management (2008)

Journal Article

Reflections on using the story completion method in designing tangible user interfaces (2024)

Security Responses in Software Development (2023)

Significant Features for Human Activity Recognition Using Tri-Axial Accelerometers (2022)

Designing Tangibles to Support Emotion Logging for Older Adults: Development and Usability Study (2022)

Digital detectives: websleuthing reduces eyewitness identification accuracy in police lineups (2021)

Privacy Care: A Tangible Interaction Framework for Privacy Management (2021)

Building trust in digital policing: a scoping review of community policing apps (2021)

Altruism and anxiety: Engagement with online community support initiatives (OCSIs) during Covid-19 lockdown in the UK and Ireland (2020)

EUD-MARS: End-User Development of Model-Driven Adaptive Robotics Software Systems (2020)

Designing Privacy-aware Internet of Things Applications (2020)

Towards Increasing Trust In Expert Evidence Derived From Malware Forensic Tools (2020)

Taking the Middle Path: Learning about Security Through Online Social Interaction (2020)

The Psychology of Privacy in the Digital Age (2019)

LiveBox: A Self-Adaptive Forensic-Ready Service for Drones (2019)

Assessing the Privacy of mHealth Apps for Self-Tracking: Heuristic Evaluation Approach (2018)

Feature-driven Mediator Synthesis: Supporting Collaborative Security in the Internet of Things (2018)

Logging you, Logging me: A Replicable Study of Privacy and Sharing Behaviour in Groups of Visual Lifeloggers (2017)

Visual Simple Transformations: Empowering End-Users to Wire Internet of Things Objects (2017)

A comparison of MOOC development and delivery approaches (2017)

Valorising the IoT Databox: creating value for everyone (2017)

Engineering Adaptive Model-Driven User Interfaces (2016)

Protecting Privacy in the Cloud: Current Practices, Future Directions (2016)

Adaptive model-driven user interface development systems (2015)

“Why can’t I do that?”: tracing adaptive security decisions (2015)

Educating the Internet-of-Things generation (2013)

Analysing monitoring and switching problems for adaptive systems (2012)

Commentary on ‘Software architectures and mobility: A roadmap’ (2010)

A formal logic approach to firewall packet filtering analysis and generation (2009)

Policy conflict analysis for diffserv quality of service management (2009)

Policy refinement for IP differentiated services quality of service management (2006)

Other

Human Rights Council’s Advisory Committee Questionnaire on Technology-Facilitated Gender-Based Violence against Women and Girls (2025)

Evaluating Malware Forensics Tools (2022)

Presentation / Conference

To Protect & Serve: Enabling Responsible Software Engineering for Online Safety (2025)

Labeling Synthetic Content: User Perceptions of Warning Label Designs for AI-generated Content on Social Media (2025)

Exploring citizen forensics: witnesses, websleuths, vigilantes and the need for multi-directional channels of online collaboration (2024)

Taming App Reliability: Mobile Analytics ‘in the wild’ (2024)

Understanding Pedestrians’ Perception of Safety and Safe Mobility Practices (2024)

How Do People Use a Public Gratitude Platform in the Wild? (2024)

Towards a Socio-Technical Understanding of Police-Citizen Interactions (2023)

Socio-Technical Resilience for Community Healthcare (2023)

A Card-based Ideation Toolkit to Generate Designs for Tangible Privacy Management Tools (2023)

Attitudes towards Online Community Support Initiatives during the COVID-19 Pandemic: A Survey in the UK (2022)

Up Close and Personal: Exploring User-preferred Image Schemas for Intuitive Privacy Awareness and Control (2021)

Finding & Reviewing Community Policing Apps in Asia (2020)

How are you feeling? Using Tangibles to Log the Emotions of Older Adults (2020)

Designing Technologies for Community Policing (2020)

Towards Citizen Forensics: Improving Citizen-Police Collaboration (2020)

An Anatomy of Security Conversations in Stack Overflow (2019)

Talking about Security with Professional Developers (2019)

Hopefully We Are Mostly Secure: Views on Secure Code in Professional Practice (2019)

A Sensor Platform for Non-invasive Remote Monitoring of Older Adults in Real Time (2019)

Requirements and Specifications for Adaptive Security: Concepts and Analysis (2018)

An Investigation of Security Conversations in Stack Overflow: Perceptions of Security and Community Involvement (2018)

Identifying Conflicting Requirements in Systems of Systems (2017)

Enabling End-Users to Protect Their Privacy (2017)

Learning to Share: Engineering Adaptive Decision-Support for Online Social Networks (2017)

Towards a Framework for Managing Inconsistencies in Systems of Systems (2016)

Privacy-by-Design Framework for Assessing Internet of Things Applications and Platforms (2016)

Wearables for Physical Privacy (2016)

Verifiable Limited Disclosure: Reporting and Handling Digital Evidence in Police Investigations (2016)

Privacy Dynamics: Learning Privacy Norms for Social Software (2016)

Privacy Itch and Scratch: On Body Privacy Warnings and Controls (2016)

Managing security control assumptions using causal traceability (2015)

Teaching software systems thinking at The Open University (2015)

Adaptive sharing for online social networks: a trade-off between privacy risk and social benefit (2014)

Personal Informatics for Non-Geeks: Lessons Learned from Ordinary People (2014)

Traceability for adaptive information security in the cloud (2014)

Distilling Privacy Requirements for Mobile Applications (2014)

Requirements-driven mediation for collaborative security (2014)

Integrating adaptive user interface capabilities in enterprise applications (2014)

From model-driven software development processes to problem diagnoses at runtime (2014)

Preserving designer input on concrete user interfaces using constraints while maintaining adaptive behavior (2013)

Cedar Studio: an IDE supporting adaptive model-driven user interfaces for enterprise applications (2013)

Crowdsourcing user interface adaptations for minimizing the bloat in enterprise applications (2013)

RBUIS: simplifying enterprise application user interfaces through engineering role-based adaptive behavior (2013)

Starting with Ubicomp: using the SenseBoard to introduce computing (2012)

Privacy arguments: analysing selective disclosure requirements for mobile applications (2012)

Using interpreted runtime models for devising adaptive user interfaces of enterprise applications (2012)

Towards learning to detect meaningful changes in software (2011)

PrimAndroid: privacy policy modelling and analysis for Android applications (2011)

In the best families: tracking and relationships (2011)

“Privacy-shake”: a haptic interface for managing privacy settings in mobile location sharing applications (2010)

On the impact of real-time feedback on users' behaviour in mobile location-sharing applications (2010)

Contravision: Exploring users' reactions to futuristic technology (2010)

ContraVision: presenting contrasting visions of future technology (2010)

Studying location privacy in mobile applications: 'predator vs. prey' probes (2009)

Expressive policy analysis with enhanced system dynamicity (2009)

From spaces to places: Emerging contexts in mobile privacy (2009)

Using argumentation logic for firewall configuration management (2009)

Learning rules from user behaviour (2009)

A multi-pronged empirical approach to mobile privacy investigation (2009)

Towards learning privacy policies (2007)

Using Argumentation Logic for Firewall Policy Specification and Analysis (2006)

Dynamic policy analysis and conflict resolution for DiffServ quality of service management (2006)

Policy conflict analysis for quality of service management (2005)

A Goal-based Approach to Policy Refinement (2004)

Using Event Calculus to Formalise Policy Specification and Analysis (2003)

Report

Feature-driven Mediator Synthesis: Supporting Collaborative Security in the Internet of Things (2016)

Enriching Traceability with Context for Adaptive Information Security in the Cloud (2014)

A Systematic Framework For Assessing The Implementation Phase Of Enterprise Resource Planning Systems (2012)

Cedar: Engineering Role-Based Adaptive User Interfaces for Enterprise Applications (2012)

Learning from Context: A Field Study of Privacy Awareness System for Mobile Devices (2011)

Predators and Prey: Ubiquitous Tracking, Privacy and the Social Contract (2010)

I Know What You Did Last Summer: risks of location data leakage in mobile and social computing (2009)