메뉴 건너뛰기




Volumn 63, Issue 1-2, 2005, Pages 5-24

In the eye of the beholder: A visualization-based approach to information system security

Author keywords

Event based system; Impromptu; Information practices; Privacy; Security; Swirl project; Usability; Visualization; YANCEES

Indexed keywords

ALGORITHMS; COMPUTATIONAL METHODS; COMPUTER SYSTEMS; DATA PRIVACY; MANAGEMENT INFORMATION SYSTEMS; MANAGERS; VISUALIZATION;

EID: 19944365607     PISSN: 10715819     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ijhcs.2005.04.021     Document Type: Article
Times cited : (49)

References (53)
  • 3
    • 0043232732 scopus 로고    scopus 로고
    • Users are not the enemy: Why users compromise security mechanisms and how to take remedial measures
    • A. Adams, and M.A. Sasse Users are not the enemy: why users compromise security mechanisms and how to take remedial measures Communications of the ACM 42 12 1999 40 46
    • (1999) Communications of the ACM , vol.42 , Issue.12 , pp. 40-46
    • Adams, A.1    Sasse, M.A.2
  • 9
    • 80052862897 scopus 로고    scopus 로고
    • Rethinking the design of the Internet: The end-to-end arguments vs. the brave new world
    • M.S. Blumenthal, and D.D. Clark Rethinking the design of the Internet: the end-to-end arguments vs. the brave new world ACM Transactions on Internet Technology 1 1 2001 70 109
    • (2001) ACM Transactions on Internet Technology , vol.1 , Issue.1 , pp. 70-109
    • Blumenthal, M.S.1    Clark, D.D.2
  • 10
    • 0003429117 scopus 로고    scopus 로고
    • Are passfaces more usable than passwords? a field trial investigation
    • S. McDonald Y. Waern G. Cockton Springer Berlin
    • S. Brostoff, and M.A. Sasse Are passfaces more usable than passwords? A field trial investigation S. McDonald Y. Waern G. Cockton People and Computers XIV - Usability or Else! Proceedings of HCI 2000 2000 Springer Berlin 405 424
    • (2000) People and Computers XIV - Usability or Else! Proceedings of HCI 2000 , pp. 405-424
    • Brostoff, S.1    Sasse, M.A.2
  • 17
    • 19944399587 scopus 로고    scopus 로고
    • Privacy, security...and risk and danger and secrecy and trust and identity and morality and power: Understanding collective information practices
    • Institute for Software Research, Irvine, CA
    • Dourish, P., Anderson, K., 2005. Privacy, security...and risk and danger and secrecy and trust and identity and morality and power: understanding collective information practices. Technical Report UCI-ISR-05-1, Institute for Software Research, Irvine, CA.
    • (2005) Technical Report , vol.UCI-ISR-05-1
    • Dourish, P.1    Anderson, K.2
  • 20
    • 84900482702 scopus 로고    scopus 로고
    • Security in the wild: User strategies for managing security as an everyday, practical problem
    • P. Dourish, E. Grinter, J.D. de la Flor, and M. Joseph Security in the wild: user strategies for managing security as an everyday, practical problem Personal Ubiquitous Computing 8 6 2004 391 401
    • (2004) Personal Ubiquitous Computing , vol.8 , Issue.6 , pp. 391-401
    • Dourish, P.1    Grinter, E.2    De La Flor, J.D.3    Joseph, M.4
  • 21
    • 0031250107 scopus 로고    scopus 로고
    • Pulsar: An extensible tool for monitoring large Unix sites
    • R.A. Finkel Pulsar: an extensible tool for monitoring large Unix sites Software-Practice & Experience 27 10 1997 1163 1176
    • (1997) Software-Practice & Experience , vol.27 , Issue.10 , pp. 1163-1176
    • Finkel, R.A.1
  • 31
    • 0028385109 scopus 로고
    • Three systems for cryptographic protocol analysis
    • R. Kemmerer, C. Meadows, and J. Millen Three systems for cryptographic protocol analysis Journal of Cryptology 7 2 1994 79 130
    • (1994) Journal of Cryptology , vol.7 , Issue.2 , pp. 79-130
    • Kemmerer, R.1    Meadows, C.2    Millen, J.3
  • 32
    • 0001831248 scopus 로고
    • Where are the missing masses? the sociology of a few mundane artifacts
    • W.E. Bijker J. Law MIT Press Cambridge, MA
    • B. Latour Where are the missing masses? the sociology of a few mundane artifacts W.E. Bijker J. Law Shaping Technology/Building Society 1992 MIT Press Cambridge, MA
    • (1992) Shaping Technology/Building Society
    • Latour, B.1
  • 36
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • J.H. Saltzer, and M.D. Schroeder The protection of information in computer systems Proceedings of the IEEE 63 9 1975 1278 1308
    • (1975) Proceedings of the IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.H.1    Schroeder, M.D.2
  • 40
    • 0003256112 scopus 로고    scopus 로고
    • Elvin has left the building: A publish/subscribe notification service with quenching
    • Brisbane, Australia
    • Segall, B., Arnold, D., 1997. Elvin has left the building: a publish/subscribe notification service with quenching. Proceedings of the AUUG'97, Brisbane, Australia.
    • (1997) Proceedings of the AUUG'97
    • Segall, B.1    Arnold, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.