메뉴 건너뛰기




Volumn 15, Issue 5, 2007, Pages 372-381

User-centred security applied to the development of a management information system

Author keywords

Data security; Information; Information systems; User interfaces

Indexed keywords

COMPUTER AIDED DESIGN; GRAPHICAL USER INTERFACES; SECURITY OF DATA;

EID: 34948879255     PISSN: 09685227     EISSN: None     Source Type: Journal    
DOI: 10.1108/09685220710831116     Document Type: Article
Times cited : (6)

References (16)
  • 1
    • 34948838524 scopus 로고    scopus 로고
    • "Zone alarm: Creating usable security products for consumers"
    • in Lorrie, F.C. and Simson, G. (Eds), O' Reilly Media, Sebastopol, CA
    • Berson, J. (2005), "Zone alarm: Creating usable security products for consumers", in Lorrie, F.C. and Simson, G. (Eds), Security and Usability, O' Reilly Media, Sebastopol, CA.
    • (2005) Security and Usability
    • Berson, J.1
  • 4
    • 0242696305 scopus 로고    scopus 로고
    • "An approach to usable security based on event monitoring and visualization"
    • paper presented at
    • Dourish, P. and Redmiles, D. (2002), "An approach to usable security based on event monitoring and visualization", paper presented at New Security Paradigms Workshop 02.
    • (2002) New Security Paradigms Workshop 02
    • Dourish, P.1    Redmiles, D.2
  • 5
    • 34948834849 scopus 로고    scopus 로고
    • "Usable security"
    • in Lorrie, F.C. and Simson, G. (Eds), O'Reilly Media, Sebastopol, CA
    • Flechais, I. and Sasse, A.M. (2005), "Usable security", in Lorrie, F.C. and Simson, G. (Eds), Security and Usability, O'Reilly Media, Sebastopol, CA.
    • (2005) Security and Usability
    • Flechais, I.1    Sasse, A.M.2
  • 9
    • 34948847234 scopus 로고    scopus 로고
    • "Simple desktop security with chameleon"
    • in Lorrie, F.C. and Simson, G. (Eds), O'Reilly Media, Sebastopol, CA
    • Long, C.A. and Moskowitz, C. (2005), "Simple desktop security with chameleon", in Lorrie, F.C. and Simson, G. (Eds), Security and Usability, O'Reilly Media, Sebastopol, CA.
    • (2005) Security and Usability
    • Long, C.A.1    Moskowitz, C.2
  • 10
    • 0001775576 scopus 로고
    • "Heuristic evaluation"
    • in Nielsen, J. and Mack, R.L. 9Eds), Wiley, New York, NY
    • Nielsen, J. (1994), "Heuristic evaluation", in Nielsen, J. and Mack, R.L. 9Eds), Usability Inspection Methods, Wiley, New York, NY.
    • (1994) Usability Inspection Methods
    • Nielsen, J.1
  • 11
    • 34948879791 scopus 로고    scopus 로고
    • "Talking security to management: How to do it"
    • unpublished paper submitted for review
    • Nohlberg, M. and Bäckström, J. (2007), "Talking security to management: How to do it", unpublished paper submitted for review.
    • (2007)
    • Nohlberg, M.1    Bäckström, J.2
  • 15
    • 2342492219 scopus 로고    scopus 로고
    • available at: (accessed 2 August 2006)
    • Tygar, J.D. and Whitten, A. (1998), "Usability of security: A case study", available at: http://reports-archive.adm.cs.cmu.edu/anon/ 1998/abstracts/98-155.html (accessed 2 August 2006).
    • (1998) "Usability of Security: A Case Study"
    • Tygar, J.D.1    Whitten, A.2
  • 16
    • 3042812983 scopus 로고    scopus 로고
    • Von Solms, B. and Von Solms, R. (2004), "The 10 deadly sins of information security management", Computers & Security, Vol. 23 No. 5, pp. 371-6.
    • (2004) Computers & Security , vol.23 , Issue.5 , pp. 371-376
    • Von Solms, B.1    Von Solms, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.