메뉴 건너뛰기




Volumn , Issue , 2005, Pages 137-144

Gathering evidence: Use of visual security cues in web browsers

Author keywords

Secure web based transactions; Usable security; Visual feedback; Web browsing

Indexed keywords

COMPUTER VISION; DATA REDUCTION; INTERACTIVE COMPUTER GRAPHICS; ONLINE SYSTEMS; SECURITY OF DATA;

EID: 32244434492     PISSN: 07135424     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (101)

References (10)
  • 1
    • 0043232732 scopus 로고    scopus 로고
    • Users are not the enemy: Why users compromise security mechanisms and how to take remedial measures
    • Adams, A. and M. A. Sasse (1999). "Users are not the enemy: Why users compromise security mechanisms and how to take remedial measures." Communications of the ACM 42(12): 40-46.
    • (1999) Communications of the ACM , vol.42 , Issue.12 , pp. 40-46
    • Adams, A.1    Sasse, M.A.2
  • 2
    • 0038006192 scopus 로고    scopus 로고
    • Moving icons: Detection and distraction
    • Tokyo, Japan
    • Bartram, L., C. Ware, et al. (2001). Moving Icons: Detection and Distraction. Interact 2001, Tokyo, Japan.
    • (2001) Interact 2001
    • Bartram, L.1    Ware, C.2
  • 5
    • 0038726078 scopus 로고    scopus 로고
    • Users' conceptions of Web security: A comparative study
    • Minneapolis, MN
    • Friedman, B., D. Hurley, et al. (2002). Users' conceptions of Web security: A comparative study. CHI 2002, Minneapolis, MN.
    • (2002) CHI 2002
    • Friedman, B.1    Hurley, D.2
  • 7
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • Saltzer, J. H. and M. D. Schroeder (1975). "The Protection of Information in Computer Systems." Proceedings of the IEEE 63(9): 1278-1308.
    • (1975) Proceedings of the IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.H.1    Schroeder, M.D.2
  • 8
    • 0004123512 scopus 로고    scopus 로고
    • Tobii eye-tracker
    • Tobii Technology AB (2003). User manual, Tobii eye-tracker.
    • (2003) User Manual
  • 9
    • 85084161247 scopus 로고    scopus 로고
    • Why Johnny can't encrypt: A usability evaluation of PGP 5.0
    • Washington, D.C.
    • Whitten, A. and J. D. Tygar (1999). Why Johnny can't encrypt: A usability evaluation of PGP 5.0. 8th Usenix Security Symposium, Washington, D.C.
    • (1999) 8th Usenix Security Symposium
    • Whitten, A.1    Tygar, J.D.2
  • 10
    • 35048844016 scopus 로고    scopus 로고
    • Two visual computer security network monitoring tools incorporating operator interface requirements
    • Ft. Lauderdale, Florida
    • Yurcik, W., J. Barlow, et al. (2003). Two Visual Computer Security Network Monitoring Tools Incorporating Operator Interface Requirements. CHI 2003 Workshop on Human-Computer Interaction and Security Systems, Ft. Lauderdale, Florida.
    • (2003) CHI 2003 Workshop on Human-computer Interaction and Security Systems
    • Yurcik, W.1    Barlow, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.