-
2
-
-
0007141905
-
Privacy issues in ubiquitous multimedia environments: Wake sleeping dogs or let them lie?
-
A. Sasse, & C. Johnson. Amsterdam: IOS Press
-
Adams A., Sasse M.A. Privacy issues in ubiquitous multimedia environments: wake sleeping dogs or let them lie? Sasse A., Johnson C. Human computer interaction - INTERACT'99. 1999;214-221 IOS Press, Amsterdam.
-
(1999)
Human Computer Interaction - INTERACT'99
, pp. 214-221
-
-
Adams, A.1
Sasse, M.A.2
-
3
-
-
0043232732
-
Users are not the enemy
-
Adams A., Sasse M.A. Users are not the enemy. Commun ACM. 42:1999;41-46.
-
(1999)
Commun ACM
, vol.42
, pp. 41-46
-
-
Adams, A.1
Sasse, M.A.2
-
7
-
-
2342608352
-
Viruses: Preparing for the onslaught
-
Armstrong I. Viruses: preparing for the onslaught. Secure Comput. (May):2001;24-30.
-
(2001)
Secure Comput
, Issue.MAY
, pp. 24-30
-
-
Armstrong, I.1
-
12
-
-
2342549539
-
Does size matter? 2002 survey
-
Briney A., Prince F. Does size matter? 2002 survey. Inf Secur. (September):2002.
-
(2002)
Inf Secur
, Issue.SEPTEMBER
-
-
Briney, A.1
Prince, F.2
-
13
-
-
0003429117
-
Are passfaces more usable than passwords? People and computers-XIV usability or else!
-
Sunderland, UK
-
Brostoff S, Sasse MA. Are passfaces more usable than passwords? People and Computers-XIV Usability or Else! Proceedings of HCI2000, Sunderland, UK; 2000. p. 405-24.
-
(2000)
Proceedings of HCI2000
, pp. 405-424
-
-
Brostoff, S.1
Sasse, M.A.2
-
15
-
-
2342553334
-
Ten strikes and you're out: Increasing the number of login attempts can improve password usability
-
Fort Lauderdale, Florida
-
Brostoff S, Sasse MA. Ten strikes and you're out: increasing the number of login attempts can improve password usability. Proceedings of CHI 2003 Workshop on HCI and Security Systems, Fort Lauderdale, Florida; 2003.
-
(2003)
Proceedings of CHI 2003 Workshop on HCI and Security Systems
-
-
Brostoff, S.1
Sasse, M.A.2
-
16
-
-
0005277359
-
La réutilisation en génie logiciel: Une définition d'un cadre de recherche en ergonomie cognitive
-
Bayonne, France
-
Burkardt J-M, Detienne F. La réutilisation en génie logiciel: une définition d'un cadre de recherche en ergonomie cognitive. Proceedings of ErgoIA 94, Bayonne, France; 1994. p. 83-95.
-
(1994)
Proceedings of ErgoIA 94
, pp. 83-95
-
-
Burkardt, J.-M.1
Detienne, F.2
-
17
-
-
0012376630
-
Beyond concern: Understanding net users' attitudes about online privacy
-
I. Vogelsang, & B. Compaine. Cambridge, MA: MIT Press
-
Cranor L.F., Reagle J., Ackerman M.S. Beyond concern: understanding net users' attitudes about online privacy. Vogelsang I., Compaine B. The Internet upheaval: raising questions, seeking answers in communication policy. 2000;47-70 MIT Press, Cambridge, MA.
-
(2000)
The Internet Upheaval: Raising Questions, Seeking Answers in Communication Policy
, pp. 47-70
-
-
Cranor, L.F.1
Reagle, J.2
Ackerman, M.S.3
-
18
-
-
2342497078
-
-
Southampton, PA: Computer Security Institute
-
CSI/FBI. Computer crime and security survey. 2003;Computer Security Institute, Southampton, PA. Available from: http://www.gocsi.com/forms/fbi/pdf. html.
-
(2003)
Computer Crime and Security Survey
-
-
-
20
-
-
0038300439
-
Failure to adapt or adaptations that fail: Contrasting models on procedures and safety
-
Dekker S. Failure to adapt or adaptations that fail: contrasting models on procedures and safety. Appl Ergon. 34:2003;233-238.
-
(2003)
Appl Ergon
, vol.34
, pp. 233-238
-
-
Dekker, S.1
-
24
-
-
0028815918
-
General practitioners' tacit and stated policies in the prescription of lipid lowering agents
-
Evans S.B.T., Harries C., Dennis I., Dean I. General practitioners' tacit and stated policies in the prescription of lipid lowering agents. Br J Gen Pract. 45:1995;15-18.
-
(1995)
Br J Gen Pract
, vol.45
, pp. 15-18
-
-
Evans, S.B.T.1
Harries, C.2
Dennis, I.3
Dean, I.4
-
25
-
-
2342546921
-
-
Summary of workshop WS9 held at OT 2003, Cambridge, UK, March
-
Flechais I, Sasse MA. Developing secure and usable software. Summary of workshop WS9 held at OT 2003, Cambridge, UK, March 2003. Available from: http://www.cs.ucl.ac.uk/staff/I.Flechais/downloads/oct2003.pdf.
-
(2003)
Developing Secure and Usable Software
-
-
Flechais, I.1
Sasse, M.A.2
-
26
-
-
0038726078
-
Users' conceptions of web security: A comparative study
-
Minneapolis, Minnesota
-
Friedman B, Hurley D, Howe DC, Felten E, Nissenbaum H. Users' conceptions of web security: a comparative study. Proceedings of CHI 2002, Minneapolis, Minnesota; 2002. p. 746-7.
-
(2002)
Proceedings of CHI 2002
, pp. 746-747
-
-
Friedman, B.1
Hurley, D.2
Howe, D.C.3
Felten, E.4
Nissenbaum, H.5
-
27
-
-
2342659451
-
Actualities need to be captured
-
Fujita Y. Actualities need to be captured. Cogn Technol Work. 2:2000;212-214.
-
(2000)
Cogn Technol Work
, vol.2
, pp. 212-214
-
-
Fujita, Y.1
-
28
-
-
0038218682
-
Human factor analysis of JCO criticality accident
-
Furuta K., Sasou K., Kubota R., Ujita H., Shuto Y., Yagi E. Human factor analysis of JCO criticality accident. Cogn Technol Work. 2:2000;182-203.
-
(2000)
Cogn Technol Work
, vol.2
, pp. 182-203
-
-
Furuta, K.1
Sasou, K.2
Kubota, R.3
Ujita, H.4
Shuto, Y.5
Yagi, E.6
-
29
-
-
0022746620
-
The integration of computing and routine work
-
Gasser L. The integration of computing and routine work. ACM Trans Off Inf Syst. 4:1986;205-225.
-
(1986)
ACM Trans Off Inf Syst
, vol.4
, pp. 205-225
-
-
Gasser, L.1
-
31
-
-
2342550930
-
-
Gnuftp Compromise. ftp://ftp.gnu.org/MISSING-FILES.README:2003;
-
(2003)
-
-
-
36
-
-
0009968230
-
Diagnostic et prise de décision dans les situations dynamiques
-
Hoc J.-M., Amalberti R. Diagnostic et prise de décision dans les situations dynamiques. Psychologie Française. 39:1994;177-192.
-
(1994)
Psychologie Française
, vol.39
, pp. 177-192
-
-
Hoc, J.-M.1
Amalberti, R.2
-
40
-
-
0028516213
-
High pressure steam engines and computer software
-
Leveson N. High pressure steam engines and computer software. IEEE Comput. 10:1994;65-73.
-
(1994)
IEEE Comput
, vol.10
, pp. 65-73
-
-
Leveson, N.1
-
41
-
-
0023440413
-
Commentary: Models of the decision maker in unforeseen accidents
-
Mancini G. Commentary: models of the decision maker in unforeseen accidents. Int J Man Mach Stud. 27:1987;631-639.
-
(1987)
Int J Man Mach Stud
, vol.27
, pp. 631-639
-
-
Mancini, G.1
-
45
-
-
2342549538
-
-
NetworkAssociates. W32/Deloder.worm. http://vil.nai.com/vil/content/ v_100127.htm.
-
W32/Deloder.worm
-
-
-
48
-
-
0004223940
-
-
Cambridge University Press
-
Reason J. Human error. 1990;Cambridge University Press.
-
(1990)
Human Error
-
-
Reason, J.1
-
49
-
-
2342555494
-
The COTS question is one of evidence
-
Redmill F. The COTS question is one of evidence. Saf Syst. 10:2001;8-10.
-
(2001)
Saf Syst
, vol.10
, pp. 8-10
-
-
Redmill, F.1
-
50
-
-
2342491289
-
Some dimensions of risk not often considered by engineers
-
Redmill F. Some dimensions of risk not often considered by engineers. J Syst Saf. Q4:2002;22-40.
-
(2002)
J Syst Saf
, vol.Q4
, pp. 22-40
-
-
Redmill, F.1
-
52
-
-
0033703266
-
The reuse of knowledge: A user-centered approach
-
Richards D. The reuse of knowledge: a user-centered approach. Int J Hum Comput Stud. 52:2000;553-579.
-
(2000)
Int J Hum Comput Stud
, vol.52
, pp. 553-579
-
-
Richards, D.1
-
53
-
-
2342667933
-
Computer security: Anatomy of a usability disaster, and a plan for recovery
-
Fort Lauderdale, Florida
-
Sasse A. Computer security: anatomy of a usability disaster, and a plan for recovery. Proceedings of CHI 2003 Workshop on HCI and Security Systems, Fort Lauderdale, Florida; 2003.
-
(2003)
Proceedings of CHI 2003 Workshop on HCI and Security Systems
-
-
Sasse, A.1
-
54
-
-
0035387175
-
Transforming the weakest link - A human computer interaction approach to usable effective security
-
Sasse M.A., Brostoff S., Weirich D. Transforming the weakest link - a human computer interaction approach to usable effective security. BT Technol J. 19:2001;122-131.
-
(2001)
BT Technol J
, vol.19
, pp. 122-131
-
-
Sasse, M.A.1
Brostoff, S.2
Weirich, D.3
-
57
-
-
0028408226
-
The influence of decision aids on choice strategies under conditions of high cognitive load
-
Todd P.A., Bensabat I. The influence of decision aids on choice strategies under conditions of high cognitive load. IEEE Trans Syst Man Cybernet. 24:1994;537-547.
-
(1994)
IEEE Trans Syst Man Cybernet
, vol.24
, pp. 537-547
-
-
Todd, P.A.1
Bensabat, I.2
-
58
-
-
0031488541
-
Modèle de l'opérateur et modèle du prescripteur. Le cas des consignes de résolution de situations incidentelles pour les conducteurs de trains
-
Veyrac H., Cellier J.-M., Bertrand A. Modèle de l'opérateur et modèle du prescripteur. Le cas des consignes de résolution de situations incidentelles pour les conducteurs de trains. Le Travail Humain. 60:1997;387-407.
-
(1997)
Le Travail Humain
, vol.60
, pp. 387-407
-
-
Veyrac, H.1
Cellier, J.-M.2
Bertrand, A.3
-
59
-
-
0242708745
-
Pretty good persuasion: A first step towards effective password security in the real world
-
Cloudcroft, NM
-
Weirich D, Sasse MA. Pretty good persuasion: a first step towards effective password security in the real world. Proceedings of New Security Paradigms Workshop, Cloudcroft, NM; 2002. p. 137-44.
-
(2002)
Proceedings of New Security Paradigms Workshop
, pp. 137-144
-
-
Weirich, D.1
Sasse, M.A.2
|