-
2
-
-
84900482702
-
Security in the Wild: User Strategies for Managing Security as an Everyday, Practical Problem
-
Dourish, P., Grinter, R.E., Delgado de La Flor, J., and Joseph, M. Security in the Wild: User Strategies for Managing Security as an Everyday, Practical Problem. Personal and Ubiquitous Computing, 8, (2004), 391-401.
-
(2004)
Personal and Ubiquitous Computing
, vol.8
, pp. 391-401
-
-
Dourish, P.1
Grinter, R.E.2
Delgado de La Flor, J.3
Joseph, M.4
-
3
-
-
34250737359
-
Decision Strategies and Susceptability to Phishing
-
ACM Press
-
Downs, J.S., Holbrook, M.B., and Cranor, L.F. Decision Strategies and Susceptability to Phishing. Proc. SOUPS 2006, ACM Press (2006), 79-90.
-
(2006)
Proc. SOUPS
, pp. 79-90
-
-
Downs, J.S.1
Holbrook, M.B.2
Cranor, L.F.3
-
4
-
-
0038726078
-
-
Friedman, B., Hurley, D., Howe, D., Felten, E., and Nissenbaum, E. Users' Conceptions of Web Security: A Comparative Study. Ext. Abstracts CHI 2002, ACM Press (2002), 746-747.
-
Friedman, B., Hurley, D., Howe, D., Felten, E., and Nissenbaum, E. Users' Conceptions of Web Security: A Comparative Study. Ext. Abstracts CHI 2002, ACM Press (2002), 746-747.
-
-
-
-
5
-
-
34250729756
-
Password Management Strategies for Online Accounts
-
ACM Press
-
Gaw, S. and Felten, E.W. Password Management Strategies for Online Accounts. Proc. SOUPS 2006, ACM Press (2006), 44-55.
-
(2006)
Proc. SOUPS
, pp. 44-55
-
-
Gaw, S.1
Felten, E.W.2
-
6
-
-
33745812088
-
Secrecy, Flagging, and Paranoia: Adoption Criteria in Encrypted Email
-
ACM Press
-
Gaw, S., Felten, E.W., and Fernandez-Kelly, P. Secrecy, Flagging, and Paranoia: Adoption Criteria in Encrypted Email. Proc. CHI 2006, ACM Press (2006), 591-600.
-
(2006)
Proc. CHI
, pp. 591-600
-
-
Gaw, S.1
Felten, E.W.2
Fernandez-Kelly, P.3
-
7
-
-
34250721634
-
Power Strips, Prophylactics, and Privacy
-
ACM Press
-
Gideon, J., Egelman, S., Cranor, L., and Acquisti, A. Power Strips, Prophylactics, and Privacy, Oh My!. Proc. SOUPS 2006, ACM Press (2006), 133-144.
-
(2006)
Oh My!. Proc. SOUPS
, pp. 133-144
-
-
Gideon, J.1
Egelman, S.2
Cranor, L.3
Acquisti, A.4
-
8
-
-
33745831496
-
-
Jagatic, T., Johnson, N., Jakobsson, M., and Menczer, F. Social Phishing. http://informatics.indiana.edu/fil/Net/social_phishing.pdf
-
Social Phishing
-
-
Jagatic, T.1
Johnson, N.2
Jakobsson, M.3
Menczer, F.4
-
9
-
-
84869031038
-
HCI and Security Systems
-
ACM Press
-
Patrick, A.S., Long, A.C., and Flinn, S. HCI and Security Systems. Proc. CHI 2003, ACM Press (2003), 1056-1057.
-
(2003)
Proc. CHI
, pp. 1056-1057
-
-
Patrick, A.S.1
Long, A.C.2
Flinn, S.3
-
10
-
-
32244434492
-
Gathering Evidence: Use of Visual Security Cues in Web Browsers
-
ACM Press
-
Whalen, T. and Inkpen, K.M. Gathering Evidence: Use of Visual Security Cues in Web Browsers. Proc. Graphics Interface 2005, ACM Press (2005), 137-144.
-
(2005)
Proc. Graphics Interface
, pp. 137-144
-
-
Whalen, T.1
Inkpen, K.M.2
-
11
-
-
85084161247
-
Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0
-
USENIX Press
-
Whitten, A. and Tygar, J.D. Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0. Proc. USENIX 1999, USENIX Press (1999), 169-184.
-
(1999)
Proc. USENIX
, pp. 169-184
-
-
Whitten, A.1
Tygar, J.D.2
-
12
-
-
33745867321
-
Security Toolbars Actually Prevent Phishing Attacks?
-
ACM Press
-
Wu, M., Miller, R.C., and Garfinkel, S.L. Do Security Toolbars Actually Prevent Phishing Attacks? Proc. CHI 2006, ACM Press (2006), 601-610.
-
(2006)
Proc. CHI
, pp. 601-610
-
-
Wu, M.1
Miller, R.C.2
Garfinkel, S.L.D.3
-
13
-
-
34250786200
-
Web Wallet: Preventing Phishing Attacks by Revealing User Intentions
-
ACM Press
-
Wu, M., Miller, R.C., and Little, G. Web Wallet: Preventing Phishing Attacks by Revealing User Intentions. Proc. SOUPS 2006, ACM Press (2006), 102-113.
-
(2006)
Proc. SOUPS
, pp. 102-113
-
-
Wu, M.1
Miller, R.C.2
Little, G.3
|