메뉴 건너뛰기




Volumn , Issue , 2001, Pages 137-143

Pretty good persuasion: A first step towards effective password security in the real world

Author keywords

Cognitive task analysis; Mental models; Motivation; Passwords; Security; User training; User centered design

Indexed keywords

COMPUTER CRIME; CRYPTOGRAPHY; DATA PRIVACY; MATHEMATICAL MODELS; SECURITY SYSTEMS;

EID: 0242708745     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (125)

References (12)
  • 5
    • 0003666631 scopus 로고
    • Discourse and social psychology. Beyond attitudes and behaviour
    • Sage Publications Ltd., London
    • Potter, J. and Wetherell, M. (1987). "Discourse and social psychology. Beyond attitudes and behaviour", Sage Publications Ltd., London.
    • (1987)
    • Potter, J.1    Wetherell, M.2
  • 6
    • 0003305863 scopus 로고    scopus 로고
    • Mitnick to lawmakers: People, phones and weakest links
    • Poulsen, K. (2000). "Mitnick to lawmakers: People, phones and weakest links", http://www.politechbot.com/p-00969.html.
    • (2000)
    • Poulsen, K.1
  • 8
    • 0002247369 scopus 로고
    • Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation
    • In J. Cacioppo & R. Petty (Eds.); New York: Guilford Press
    • Rogers, R.W. (1983). "Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation", In J. Cacioppo & R. Petty (Eds.), Social Psychophysiology. New York: Guilford Press.
    • (1983) Social Psychophysiology
    • Rogers, R.W.1
  • 9
    • 0035387175 scopus 로고    scopus 로고
    • Transforming the "weakest link": A human-computer interaction approach to usable and effective security
    • July
    • Sasse, M.A., Brostoff, S. and Weirich, D. (2001): Transforming the "weakest link": a human-computer interaction approach to usable and effective security. BT Technical Journal, Vol 19 (3) July 2001, pp. 122-131.
    • (2001) BT Technical Journal , vol.19 , Issue.3 , pp. 122-131
    • Sasse, M.A.1    Brostoff, S.2    Weirich, D.3
  • 11
    • 0242444873 scopus 로고    scopus 로고
    • Corporate espionage: What it is, why it is happening your company, what you must do about it
    • Prima Publishing, CA
    • Winkler, I. (1997), "Corporate Espionage: what it is, why it is happening your company, what you must do about it", Prima Publishing, CA.
    • (1997)
    • Winkler, I.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.