-
1
-
-
0043232732
-
Users are not the enemy
-
Adams, A. and Sasse, M.A. (1999), "Users are not the enemy", Communications of the ACM, Vol. 42, No. 12.
-
(1999)
Communications of the ACM
, vol.42
, Issue.12
-
-
Adams, A.1
Sasse, M.A.2
-
2
-
-
0242444871
-
Making passwords secure and usable
-
In H. Thimbleby, B. O'Conaill & P. Thomas (Eds.)
-
Adams, A., Sasse, M.A. and Lunt, P. (1997), "Making passwords secure and usable", In H. Thimbleby, B. O'Conaill & P. Thomas (Eds.), "People & Computers XII (Proceedings of HCI'97)", Springer, pp. 1-19.
-
(1997)
People & Computers XII (Proceedings of HCI'97), Springer
, pp. 1-19
-
-
Adams, A.1
Sasse, M.A.2
Lunt, P.3
-
3
-
-
0242528391
-
Usability and security
-
In Guenter Mueller & Kai Rannenberg (Eds.); Addison Wesley
-
Dufft, Cornelius C., Espey, Juergen, Neuf, Harmut, Rudinger, Georg and Stapf, Kurt (1999), "Usability and Security", In Guenter Mueller & Kai Rannenberg (Eds.), "Multilateral Security in Communications, Volume 3 - Technology, Infrastructure, Economy", Addison Wesley.
-
(1999)
Multilateral Security in Communications, Volume 3 - Technology, Infrastructure, Economy
-
-
Dufft, C.C.1
Espey, J.N.2
Harmut, R.G.3
Stapf, K.4
-
5
-
-
0003666631
-
Discourse and social psychology. Beyond attitudes and behaviour
-
Sage Publications Ltd., London
-
Potter, J. and Wetherell, M. (1987). "Discourse and social psychology. Beyond attitudes and behaviour", Sage Publications Ltd., London.
-
(1987)
-
-
Potter, J.1
Wetherell, M.2
-
6
-
-
0003305863
-
Mitnick to lawmakers: People, phones and weakest links
-
Poulsen, K. (2000). "Mitnick to lawmakers: People, phones and weakest links", http://www.politechbot.com/p-00969.html.
-
(2000)
-
-
Poulsen, K.1
-
7
-
-
0242528323
-
Examining users' repertoire of internet applications
-
In M.A.Sasse & C.Johnson [Eds.]
-
Rimmer, J., Wakeman, I., Sheeran, L. and Sasse, M.A. (1999), "Examining users' repertoire of Internet applications", In M.A.Sasse & C.Johnson [Eds.], "Human-Computer Interaction - Proceedings of INTERACT '99".
-
(1999)
Human-Computer Interaction - Proceedings of INTERACT '99
-
-
Rimmer, J.1
Wakeman, I.2
Sheeran, L.3
Sasse, M.A.4
-
8
-
-
0002247369
-
Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation
-
In J. Cacioppo & R. Petty (Eds.); New York: Guilford Press
-
Rogers, R.W. (1983). "Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation", In J. Cacioppo & R. Petty (Eds.), Social Psychophysiology. New York: Guilford Press.
-
(1983)
Social Psychophysiology
-
-
Rogers, R.W.1
-
9
-
-
0035387175
-
Transforming the "weakest link": A human-computer interaction approach to usable and effective security
-
July
-
Sasse, M.A., Brostoff, S. and Weirich, D. (2001): Transforming the "weakest link": a human-computer interaction approach to usable and effective security. BT Technical Journal, Vol 19 (3) July 2001, pp. 122-131.
-
(2001)
BT Technical Journal
, vol.19
, Issue.3
, pp. 122-131
-
-
Sasse, M.A.1
Brostoff, S.2
Weirich, D.3
-
11
-
-
0242444873
-
Corporate espionage: What it is, why it is happening your company, what you must do about it
-
Prima Publishing, CA
-
Winkler, I. (1997), "Corporate Espionage: what it is, why it is happening your company, what you must do about it", Prima Publishing, CA.
-
(1997)
-
-
Winkler, I.1
|