-
1
-
-
34948838524
-
"Zone alarm: Creating usable security products for consumers"
-
in Lorrie, F.C. and Simson, G. (Eds), O' Reilly Media, Sebastopol, CA
-
Berson, J. (2005), "Zone alarm: Creating usable security products for consumers", in Lorrie, F.C. and Simson, G. (Eds), Security and Usability, O' Reilly Media, Sebastopol, CA.
-
(2005)
Security and Usability
-
-
Berson, J.1
-
2
-
-
34948872758
-
-
available at: (accessed November 2006)
-
DePaula, R., Ding, X., Dourish, P., Nies, K., Pillet, B., Redmiles, D., Ren, J., Rode, J. and Silva, F.R. (2005), "Two experiences designing for effective security", available at: http://cups.cs.cmu.edu/soups/2005/2005proceedings/p25/depaula.pdf (accessed November 2006).
-
(2005)
"Two Experiences Designing for Effective Security"
-
-
DePaula, R.1
Ding, X.2
Dourish, P.3
Nies, K.4
Pillet, B.5
Redmiles, D.6
Ren, J.7
Rode, J.8
Silva, F.R.9
-
4
-
-
0242696305
-
"An approach to usable security based on event monitoring and visualization"
-
paper presented at
-
Dourish, P. and Redmiles, D. (2002), "An approach to usable security based on event monitoring and visualization", paper presented at New Security Paradigms Workshop 02.
-
(2002)
New Security Paradigms Workshop 02
-
-
Dourish, P.1
Redmiles, D.2
-
5
-
-
34948834849
-
"Usable security"
-
in Lorrie, F.C. and Simson, G. (Eds), O'Reilly Media, Sebastopol, CA
-
Flechais, I. and Sasse, A.M. (2005), "Usable security", in Lorrie, F.C. and Simson, G. (Eds), Security and Usability, O'Reilly Media, Sebastopol, CA.
-
(2005)
Security and Usability
-
-
Flechais, I.1
Sasse, A.M.2
-
6
-
-
33845545986
-
"Considering the usability of end-user security software"
-
Karlstad, Sweden, May 22-24
-
Furnell, S.M., Jusoh, A., Katsabas, D. and Dowland, P. (2006), "Considering the usability of end-user security software", Proceedings of 21st IFIP International Information Security Conference (IFIP SEC 2006), Karlstad, Sweden, May 22-24, pp. 307-16.
-
(2006)
Proceedings of 21st IFIP International Information Security Conference (IFIP SEC 2006)
, pp. 307-316
-
-
Furnell, S.M.1
Jusoh, A.2
Katsabas, D.3
Dowland, P.4
-
7
-
-
0003452645
-
-
Wiley, New York, NY
-
Hackos, J.T. and Redish, J.C. (1998), User and Task Analysis for Interface Design, Wiley, New York, NY.
-
(1998)
User and Task Analysis for Interface Design
-
-
Hackos, J.T.1
Redish, J.C.2
-
9
-
-
34948847234
-
"Simple desktop security with chameleon"
-
in Lorrie, F.C. and Simson, G. (Eds), O'Reilly Media, Sebastopol, CA
-
Long, C.A. and Moskowitz, C. (2005), "Simple desktop security with chameleon", in Lorrie, F.C. and Simson, G. (Eds), Security and Usability, O'Reilly Media, Sebastopol, CA.
-
(2005)
Security and Usability
-
-
Long, C.A.1
Moskowitz, C.2
-
10
-
-
0001775576
-
"Heuristic evaluation"
-
in Nielsen, J. and Mack, R.L. 9Eds), Wiley, New York, NY
-
Nielsen, J. (1994), "Heuristic evaluation", in Nielsen, J. and Mack, R.L. 9Eds), Usability Inspection Methods, Wiley, New York, NY.
-
(1994)
Usability Inspection Methods
-
-
Nielsen, J.1
-
11
-
-
34948879791
-
"Talking security to management: How to do it"
-
unpublished paper submitted for review
-
Nohlberg, M. and Bäckström, J. (2007), "Talking security to management: How to do it", unpublished paper submitted for review.
-
(2007)
-
-
Nohlberg, M.1
Bäckström, J.2
-
15
-
-
2342492219
-
-
available at: (accessed 2 August 2006)
-
Tygar, J.D. and Whitten, A. (1998), "Usability of security: A case study", available at: http://reports-archive.adm.cs.cmu.edu/anon/ 1998/abstracts/98-155.html (accessed 2 August 2006).
-
(1998)
"Usability of Security: A Case Study"
-
-
Tygar, J.D.1
Whitten, A.2
-
16
-
-
3042812983
-
-
Von Solms, B. and Von Solms, R. (2004), "The 10 deadly sins of information security management", Computers & Security, Vol. 23 No. 5, pp. 371-6.
-
(2004)
Computers & Security
, vol.23
, Issue.5
, pp. 371-376
-
-
Von Solms, B.1
Von Solms, R.2
|