메뉴 건너뛰기




Volumn 201, Issue , 2006, Pages 307-316

Considering the usability of end-user security software

Author keywords

[No Author keywords available]

Indexed keywords

BENCHMARKING; SECURITY OF DATA; SECURITY SYSTEMS;

EID: 33845545986     PISSN: 15715736     EISSN: None     Source Type: Book Series    
DOI: 10.1007/0-387-33406-8_26     Document Type: Article
Times cited : (8)

References (6)
  • 3
    • 0001775576 scopus 로고
    • "Heuristic evaluation"
    • in Nielsen, J. and Mack, R.L. (Eds.), John Wiley & Sons, New York
    • Nielsen, J. 1994. "Heuristic evaluation", in Nielsen, J. and Mack, R.L. (Eds.), Usability Inspection Methods, John Wiley & Sons, New York.
    • (1994) Usability Inspection Methods
    • Nielsen, J.1
  • 4
    • 32444433117 scopus 로고    scopus 로고
    • "The challenges of understanding and using security: A survey of end-users"
    • Furnell, S.M., Jusoh, A. and Katsabas, D. 2006. "The challenges of understanding and using security: A survey of end-users", Computers & Security, vol. 25, no. 1.
    • (2006) Computers, & Security , vol.25 , Issue.1
    • Furnell, S.M.1    Jusoh, A.2    Katsabas, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.