-
1
-
-
33847350769
-
-
Fox S, Anderson JQ, Rainie L. The future of the internet. Technical report, Pew Internet and American life project, 〈http://www.pewinternet.org/pdfs/PIP_Future_of_Internet.pdf〉; 2005 [Accessed May 2006].
-
-
-
-
2
-
-
33847342191
-
-
Joyce E. Amazon's profit jumps, but it eases outlook, 〈internetnews.com〉; [21 October 2004].
-
-
-
-
3
-
-
33847369121
-
-
DTI. Information security factsheet, 〈http://www.dti.gov.uk/bestpractice/assets/security/intro-to-info.pdf〉; 2005.
-
-
-
-
4
-
-
33847371305
-
-
Deliotte. Global security survey 〈http://www.ladlass.com/ice/archives/files/deliotte〉.
-
-
-
-
5
-
-
33847418482
-
-
Hills S. Millions 'are wide open to online crime', Metro; 28 October 2005.
-
-
-
-
6
-
-
33847347389
-
-
Rash W. Password chaos threatens e-commerce; 15 February 2002.
-
-
-
-
7
-
-
33847367341
-
-
Schneier B. Cryptogram newsletter, 〈http://www.schneier.com〉; September 2005.
-
-
-
-
8
-
-
27644524446
-
Bridging the gap between software development and information security
-
van Wyk K.R., and McGraw G. Bridging the gap between software development and information security. IEEE Secur Privacy 3 5 (2005) 75-79
-
(2005)
IEEE Secur Privacy
, vol.3
, Issue.5
, pp. 75-79
-
-
van Wyk, K.R.1
McGraw, G.2
-
10
-
-
0019146023
-
Risks of risk decisions
-
Starr C., and Whipple C. Risks of risk decisions. Science 208 (1980) 1114-1119
-
(1980)
Science
, vol.208
, pp. 1114-1119
-
-
Starr, C.1
Whipple, C.2
-
11
-
-
33847422385
-
-
Risk assessment: report of a royal society study group. London; The Royal Society. 1983.
-
-
-
-
12
-
-
33847395066
-
-
Adams J. Risk. University College London; 1995.
-
-
-
-
13
-
-
0003020377
-
The emergence of risk communication studies: social and political context
-
Plough A., and Krimsky S. The emergence of risk communication studies: social and political context. Sci Technol Hum Values 12 3-4 (1987) 4-10
-
(1987)
Sci Technol Hum Values
, vol.12
, Issue.3-4
, pp. 4-10
-
-
Plough, A.1
Krimsky, S.2
-
14
-
-
0000866989
-
Comparing risks thoughtfully
-
Finkel A.M. Comparing risks thoughtfully. Risk 7 4 (1996) 325-359
-
(1996)
Risk
, vol.7
, Issue.4
, pp. 325-359
-
-
Finkel, A.M.1
-
15
-
-
84991269825
-
Quality time: the fundamentals of information-security
-
Pfleeger C.P. Quality time: the fundamentals of information-security. IEEE Software 14 1 (1997) 15-16,60
-
(1997)
IEEE Software
, vol.14
, Issue.1
-
-
Pfleeger, C.P.1
-
17
-
-
33847395946
-
-
Alberts CJ, Behrens AG, Pethia RD, Wilson WR. Operationally critical threat, asset and vulnerability evaluation (octave) framework. Technical report CMU/SEI-99-TR-017, version 1.0, Carnegie Mellon University Software Engineering Institute, 〈http://www.sei.cmu.edu/pub/documents/99.reports/pdf/99tr017.pdf〉; June 1999.
-
-
-
-
18
-
-
33847353907
-
Threat agents: what infosec officers need to know
-
Vidalis S., and Jones A. Threat agents: what infosec officers need to know. Mediterr J Comput Networks 1 2 (2005) 97-110
-
(2005)
Mediterr J Comput Networks
, vol.1
, Issue.2
, pp. 97-110
-
-
Vidalis, S.1
Jones, A.2
-
19
-
-
85055233227
-
-
Auerbach, Philadelphia, PA 〈http://www.peltierassociates.com/frap.htm〉
-
Peltier T.R. Information security risk analysis (2005), Auerbach, Philadelphia, PA. http://www.peltierassociates.com/frap.htm 〈http://www.peltierassociates.com/frap.htm〉
-
(2005)
Information security risk analysis
-
-
Peltier, T.R.1
-
20
-
-
0031597183
-
-
Briand LC, Emam KE, Bomarius F. Cobra: a hybrid method for software COst estimation, benchmarking, and risk assessment. In: Twentieth international conference on software engineering (ICSE'98); 1998. p. 390 〈http://www.riskworld.net/index.htm〉.
-
-
-
-
21
-
-
33847378586
-
-
American Chemical Society. Understanding risk analysis. A short guide for health, safety, and environmental policy making, 〈http://www.rff.org/rff/Publications/loader.cfm?url=/commonspot/security%/getfile.cfm{minus 45 degree rule}&PageID=14418〉; 1998.
-
-
-
-
22
-
-
33847366345
-
Measuring ROI on security
-
Tipton H.F., and Krause M. (Eds), Auerbach Publications, Philadelphia, PA
-
Endorf C.F. Measuring ROI on security. In: Tipton H.F., and Krause M. (Eds). Information security management handbook. 5th ed. (2004), Auerbach Publications, Philadelphia, PA 685-688
-
(2004)
Information security management handbook. 5th ed.
, pp. 685-688
-
-
Endorf, C.F.1
-
24
-
-
0030938986
-
Coming to terms with the terms of risk
-
Kraemer H.C., Kazdin A., Offord D., Kessler R.C., Jensen P.S., and Kupfer D.J. Coming to terms with the terms of risk. Arch Gen Psychiatry 54 (1997) 337-343
-
(1997)
Arch Gen Psychiatry
, vol.54
, pp. 337-343
-
-
Kraemer, H.C.1
Kazdin, A.2
Offord, D.3
Kessler, R.C.4
Jensen, P.S.5
Kupfer, D.J.6
-
28
-
-
33847356596
-
Outsourcing security
-
Tipton H.F., and Krause M. (Eds), Auerbach, Philadelphia, PA
-
Tiller J.S. Outsourcing security. In: Tipton H.F., and Krause M. (Eds). Information security management handbook. 5th Ed. (2004), Auerbach, Philadelphia, PA 1061-1072
-
(2004)
Information security management handbook. 5th Ed.
, pp. 1061-1072
-
-
Tiller, J.S.1
-
30
-
-
33847367815
-
-
Greene A. A process approach to project risk management. In: Doctoral research workshop: construction process research, Loughborough University; 2000. p. 14-25.
-
-
-
-
31
-
-
0033178111
-
Trust, emotion, sex, politics and science: surveying the risk-assessment battlefield
-
Slovic P. Trust, emotion, sex, politics and science: surveying the risk-assessment battlefield. Risk Anal 19 4 (1999) 689-701
-
(1999)
Risk Anal
, vol.19
, Issue.4
, pp. 689-701
-
-
Slovic, P.1
-
32
-
-
19944372131
-
Is a picture really worth a thousand words? Reflecting on the usability of graphical authentication systems
-
[special issue]
-
De Angeli A., Coventry L., Johnson G., and Renaud K. Is a picture really worth a thousand words? Reflecting on the usability of graphical authentication systems. Int J Human-Comput Stud HCI research on Privacy and Security 63 1-2 (2005) 128-152 [special issue]
-
(2005)
Int J Human-Comput Stud HCI research on Privacy and Security
, vol.63
, Issue.1-2
, pp. 128-152
-
-
De Angeli, A.1
Coventry, L.2
Johnson, G.3
Renaud, K.4
-
34
-
-
4243096135
-
The domino effect of password reuse
-
Ives B., Walsh K.R., and Schneider H. The domino effect of password reuse. Commun ACM 47 4 (2004) 75-78
-
(2004)
Commun ACM
, vol.47
, Issue.4
, pp. 75-78
-
-
Ives, B.1
Walsh, K.R.2
Schneider, H.3
-
35
-
-
33847338583
-
-
Braghin C. Biometric authentication, 〈http://citeseer.ist.psu.edu/436492.html〉; November 2000 [Accessed 13 April 2005].
-
-
-
-
36
-
-
84962052143
-
Identity theft, social security numbers, and the web
-
Berghel H. Identity theft, social security numbers, and the web. CACM 43 2 (2000) 17-21
-
(2000)
CACM
, vol.43
, Issue.2
, pp. 17-21
-
-
Berghel, H.1
-
37
-
-
84955153370
-
Picture memory
-
Yuille J. (Ed), Lawrence Erlbaum Associates, Hillsdale, NJ
-
Madigan S. Picture memory. In: Yuille J. (Ed). Imagery, memory, and cognition: essays in honour of Allan Paivio (1983), Lawrence Erlbaum Associates, Hillsdale, NJ 65-86
-
(1983)
Imagery, memory, and cognition: essays in honour of Allan Paivio
, pp. 65-86
-
-
Madigan, S.1
-
39
-
-
85084161493
-
Déjà vu: a user study using images for authentication
-
Denver, Colorado
-
Dhamija R., and Perrig A. Déjà vu: a user study using images for authentication. Proceedings of USENIX security symposium (2000), Denver, Colorado 45-58
-
(2000)
Proceedings of USENIX security symposium
, pp. 45-58
-
-
Dhamija, R.1
Perrig, A.2
-
40
-
-
0037668484
-
VIP: a visual approach to user authentication
-
ACM Press, New York
-
De Angeli A., Coutts M., Coventry L., and Johnson G.I. VIP: a visual approach to user authentication. Proceedings of the working conference on advanced visual interfaces AVI 2000 (2002), ACM Press, New York 316-323
-
(2002)
Proceedings of the working conference on advanced visual interfaces AVI 2000
, pp. 316-323
-
-
De Angeli, A.1
Coutts, M.2
Coventry, L.3
Johnson, G.I.4
-
41
-
-
33847389874
-
-
Blonder GE. Graphical password. United States Patent 5559961; 1996.
-
-
-
-
42
-
-
9944240263
-
My password is here! Investigating authentication schemes based on visuo-spatial memory
-
Renaud K.V., and De Angeli A. My password is here! Investigating authentication schemes based on visuo-spatial memory. Interacting Comput 16 6 (2004) 1017-1041
-
(2004)
Interacting Comput
, vol.16
, Issue.6
, pp. 1017-1041
-
-
Renaud, K.V.1
De Angeli, A.2
-
43
-
-
33847390416
-
-
Jermyn I, Mayer A, Monrose F, Reoter MK, Rubin AD. The design and analysis of graphical passwords. In: Proceedings of the ninth USENIX security symposium; 2000. Electronic proceedings 〈http://www.usenix.org/publications/library/proceedings/sec2000/technica%l.html〉.
-
-
-
-
44
-
-
85084163855
-
-
Thorpe J, van Oorschot P. Graphical dictionaries and the memorable space of graphical passwords. In: Thirteenth USENIX security symposium; 2004. p. 135-50.
-
-
-
-
45
-
-
79959966395
-
-
Renaud K. A visuo-biometric authenticaton mechanism for older users. In: Proceedings of the British HCI 2005. Edinburgh; September 5-9, 2005. p. 167-82.
-
-
-
-
46
-
-
10044293457
-
Comparing passwords, tokens, and biometrics for user authentication
-
O'Gorman L. Comparing passwords, tokens, and biometrics for user authentication. Proceedings of the IEEE 91 12 (2003) 2019-2040
-
(2003)
Proceedings of the IEEE
, vol.91
, Issue.12
, pp. 2019-2040
-
-
O'Gorman, L.1
-
47
-
-
33847357415
-
-
IASEP, Data security protocol for education. Center for Information Assurance and Security and the Indiana Assessment System of Education Proficiencies. Purdue Research Foundation 〈http://iasep.soe.purdue.edu/Protocol/home_page.htm〉; September 2000.
-
-
-
-
48
-
-
33847379033
-
-
Miller JC. Risk assessment for your web site. IRMI.com, International Risk Management Institute 〈http://www.irmi.com/Expert/Articles/2000/Schoenfeld.aspx〉; September 2000.
-
-
-
-
49
-
-
33847421933
-
-
Blaze M. Safecracking for the computer scientist. Technical report, CIS Department, University of Pennsylvania; 2004.
-
-
-
|