메뉴 건너뛰기




Volumn , Issue , 2007, Pages 2833-2836

Security user studies: Methodologies and best practices

Author keywords

Information security; Usable security; User studies

Indexed keywords

HUMAN COMPUTER INTERACTION; SECURITY OF DATA; SOFTWARE TESTING; USER INTERFACES;

EID: 35348898406     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1240866.1241089     Document Type: Conference Paper
Times cited : (11)

References (13)
  • 3
    • 34250737359 scopus 로고    scopus 로고
    • Decision Strategies and Susceptability to Phishing
    • ACM Press
    • Downs, J.S., Holbrook, M.B., and Cranor, L.F. Decision Strategies and Susceptability to Phishing. Proc. SOUPS 2006, ACM Press (2006), 79-90.
    • (2006) Proc. SOUPS , pp. 79-90
    • Downs, J.S.1    Holbrook, M.B.2    Cranor, L.F.3
  • 4
    • 0038726078 scopus 로고    scopus 로고
    • Friedman, B., Hurley, D., Howe, D., Felten, E., and Nissenbaum, E. Users' Conceptions of Web Security: A Comparative Study. Ext. Abstracts CHI 2002, ACM Press (2002), 746-747.
    • Friedman, B., Hurley, D., Howe, D., Felten, E., and Nissenbaum, E. Users' Conceptions of Web Security: A Comparative Study. Ext. Abstracts CHI 2002, ACM Press (2002), 746-747.
  • 5
    • 34250729756 scopus 로고    scopus 로고
    • Password Management Strategies for Online Accounts
    • ACM Press
    • Gaw, S. and Felten, E.W. Password Management Strategies for Online Accounts. Proc. SOUPS 2006, ACM Press (2006), 44-55.
    • (2006) Proc. SOUPS , pp. 44-55
    • Gaw, S.1    Felten, E.W.2
  • 6
    • 33745812088 scopus 로고    scopus 로고
    • Secrecy, Flagging, and Paranoia: Adoption Criteria in Encrypted Email
    • ACM Press
    • Gaw, S., Felten, E.W., and Fernandez-Kelly, P. Secrecy, Flagging, and Paranoia: Adoption Criteria in Encrypted Email. Proc. CHI 2006, ACM Press (2006), 591-600.
    • (2006) Proc. CHI , pp. 591-600
    • Gaw, S.1    Felten, E.W.2    Fernandez-Kelly, P.3
  • 9
    • 84869031038 scopus 로고    scopus 로고
    • HCI and Security Systems
    • ACM Press
    • Patrick, A.S., Long, A.C., and Flinn, S. HCI and Security Systems. Proc. CHI 2003, ACM Press (2003), 1056-1057.
    • (2003) Proc. CHI , pp. 1056-1057
    • Patrick, A.S.1    Long, A.C.2    Flinn, S.3
  • 10
    • 32244434492 scopus 로고    scopus 로고
    • Gathering Evidence: Use of Visual Security Cues in Web Browsers
    • ACM Press
    • Whalen, T. and Inkpen, K.M. Gathering Evidence: Use of Visual Security Cues in Web Browsers. Proc. Graphics Interface 2005, ACM Press (2005), 137-144.
    • (2005) Proc. Graphics Interface , pp. 137-144
    • Whalen, T.1    Inkpen, K.M.2
  • 11
    • 85084161247 scopus 로고    scopus 로고
    • Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0
    • USENIX Press
    • Whitten, A. and Tygar, J.D. Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0. Proc. USENIX 1999, USENIX Press (1999), 169-184.
    • (1999) Proc. USENIX , pp. 169-184
    • Whitten, A.1    Tygar, J.D.2
  • 12
    • 33745867321 scopus 로고    scopus 로고
    • Security Toolbars Actually Prevent Phishing Attacks?
    • ACM Press
    • Wu, M., Miller, R.C., and Garfinkel, S.L. Do Security Toolbars Actually Prevent Phishing Attacks? Proc. CHI 2006, ACM Press (2006), 601-610.
    • (2006) Proc. CHI , pp. 601-610
    • Wu, M.1    Miller, R.C.2    Garfinkel, S.L.D.3
  • 13
    • 34250786200 scopus 로고    scopus 로고
    • Web Wallet: Preventing Phishing Attacks by Revealing User Intentions
    • ACM Press
    • Wu, M., Miller, R.C., and Little, G. Web Wallet: Preventing Phishing Attacks by Revealing User Intentions. Proc. SOUPS 2006, ACM Press (2006), 102-113.
    • (2006) Proc. SOUPS , pp. 102-113
    • Wu, M.1    Miller, R.C.2    Little, G.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.