-
1
-
-
12844272841
-
Search of Usable Security: Five Lessons from the Field
-
September - October
-
Balfanz, D., Durfee, G., Grinter, R.E. & Smetters, D.K. (2004, September - October). In Search of Usable Security: Five Lessons from the Field. IEEE Security & Privacy, 2(5), 19-24.
-
(2004)
IEEE Security & Privacy
, vol.2
, Issue.5
, pp. 19-24
-
-
Balfanz, D.1
Durfee, G.2
Grinter, R.E.3
Smetters, D.K.4
-
3
-
-
77953888897
-
-
July 27
-
Center for Discrete Mathematics & theoretical Computer Science. (2004, July 27). DIMACS Workshop on Usable Privacy and Security Software. http://dimacs.rutgers.edu/Workshops/Tools/slides/slides.html
-
(2004)
DIMACS Workshop on Usable Privacy and Security Software.
-
-
-
4
-
-
77953899207
-
-
Class Slides, from Nova Southeastern University, Graduate School of Information Sciences
-
Cohen, M. (2004). DISS 720 Human Computer Interaction. Class Slides, from Nova Southeastern University, Graduate School of Information Sciences.
-
(2004)
DISS 720 Human Computer Interaction
-
-
Cohen, M.1
-
5
-
-
12844259531
-
Secure or Usable
-
September - October
-
Craner, L.F. & Garfinkel, S.. (2004, September - October). Secure or Usable. IEEE Security & Privacy, 2(5), 16-18.
-
(2004)
IEEE Security & Privacy
, vol.2
, Issue.5
, pp. 16-18
-
-
Craner, L.F.1
Garfinkel, S.2
-
9
-
-
0038226921
-
Moving from the Design of Usable Security Technologies to the Design of Useful Secure Applications
-
New York: ACM Press
-
Grinter, R. E. & Smetters, D. K. (2002). Moving from the Design of Usable Security Technologies to the Design of Useful Secure Applications. Proceedings of the 2002 workshop on New security paradigms (pp. 82-89). New York: ACM Press.
-
(2002)
Proceedings of the 2002 Workshop on New Security Paradigms
, pp. 82-89
-
-
Grinter, R.E.1
Smetters, D.K.2
-
10
-
-
4644291382
-
Internet Accessibility: Beyond Disability
-
September
-
Hofstader, C. (2004, September). Internet Accessibility: Beyond Disability. Computer, 37(9), 103-105.
-
(2004)
Computer
, vol.37
, Issue.9
, pp. 103-105
-
-
Hofstader, C.1
-
11
-
-
77953903528
-
-
February
-
IndiaExpress Bureau. (February 2003). 2003 Will Be A Year of Mobile Developers. http://www.indiaexpress.com/news/technology/20030201-1.html
-
(2003)
2003 Will Be a Year of Mobile Developers
-
-
-
12
-
-
84892449141
-
User Interface Evaluation in the Real World: A Comparison of Four Techniques
-
Jeffries, R., Miller, J.R., Wharton, C., Uyeda, K.M. (1991).User Interface Evaluation In The Real World: A Comparison of Four Techniques. Proceedings of the SIGCHI conference on Human factors in computing systems: Reaching through technology (pp.119-124).
-
(1991)
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems: Reaching Through Technology
, pp. 119-124
-
-
Jeffries, R.1
Miller, J.R.2
Wharton, C.3
Uyeda, K.M.4
-
14
-
-
28844505804
-
-
Microsoft Corporation. Fifth Edition. Microsoft Press. Redmond, Washington
-
Microsoft Corporation. (2002). Microsoft Computer Dictionary, Fifth Edition. Microsoft Press. Redmond, Washington.
-
(2002)
Microsoft Computer Dictionary
-
-
-
15
-
-
77953899945
-
-
Motorola Incorporated. (2004). Motorola MPx200 Phone for AT&T Wireless. http://commerce.motorola.com/cgi-bin/ncommerce3/ProductDisplay? prrfnbr=253227&prmenbr=126&phone-cgrfnbr=1&zipcode=
-
(2004)
Motorola MPx200 Phone for AT&T Wireless
-
-
-
18
-
-
3042740017
-
Humans in the Loop: Human-Computer Interaction and Security
-
Smith, S.W. (2003). Humans in the Loop: Human-Computer Interaction and Security, IEEE Security & Privacy, 1(3), 75-79.
-
(2003)
IEEE Security & Privacy
, vol.1
, Issue.3
, pp. 75-79
-
-
Smith, S.W.1
-
19
-
-
0036251274
-
Generational Differences: Revisiting Generational Work Values for the New Millennium
-
Smola, K.W. & Sutton, C.D. (2002). Generational Differences: Revisiting Generational Work Values for the New Millennium, Journal of Organizational Behavior, 23(4), 363-382.
-
(2002)
Journal of Organizational Behavior
, vol.23
, Issue.4
, pp. 363-382
-
-
Smola, K.W.1
Sutton, C.D.2
-
22
-
-
12844271558
-
Aligning Security and Usability
-
September - October
-
Yee, K.P. (2004, September - October). Aligning Security and Usability. IEEE Security & Privacy, 2(5), 48-55.
-
(2004)
IEEE Security & Privacy
, vol.2
, Issue.5
, pp. 48-55
-
-
Yee, K.P.1
|