-
1
-
-
14744275332
-
Privacy and Rationality in Decision Making
-
A. Acquisti and J. Grossklags, "Privacy and Rationality in Decision Making," IEEE Security & Privacy, vol. 3, no. 1, 2005, pp. 26-33.
-
(2005)
IEEE Security & Privacy
, vol.3
, Issue.1
, pp. 26-33
-
-
Acquisti, A.1
Grossklags, J.2
-
3
-
-
0043232732
-
Users Are Not the Enemy: Why Users Compromise Security Mechanisms and How to Take Remedial Measures
-
A. Adams and M.A. Sasse, "Users Are Not the Enemy: Why Users Compromise Security Mechanisms and How to Take Remedial Measures," Comm. ACM, vol. 42, no. 12, 1999, pp. 40-46.
-
(1999)
Comm. ACM
, vol.42
, Issue.12
, pp. 40-46
-
-
Adams, A.1
Sasse, M.A.2
-
4
-
-
33745816410
-
Why Phishing Works
-
ACM Press
-
R. Dhamija, J.D. Tygar, and M. Hearst, "Why Phishing Works," Proc. Conf. Human Factors in Computing Systems (CHI 06), ACM Press, 2006, pp. 581-590.
-
(2006)
Proc. Conf. Human Factors in Computing Systems (CHI 06)
, pp. 581-590
-
-
Dhamija, R.1
Tygar, J.D.2
Hearst, M.3
-
5
-
-
41949087245
-
-
McAfee-NCSA Online Safety Study, Oct. 2007; www.staysafeonline.info/news/ ainericanslackprotection.html.
-
McAfee-NCSA Online Safety Study, Oct. 2007; www.staysafeonline.info/news/ ainericanslackprotection.html.
-
-
-
-
6
-
-
41949140178
-
-
AOL/NCSA Online Safety Study, Dec. 2005; www.staysafeonline.info/pdf/ safety_study_2005.pdf.
-
AOL/NCSA Online Safety Study, Dec. 2005; www.staysafeonline.info/pdf/ safety_study_2005.pdf.
-
-
-
-
8
-
-
85084161493
-
Déjà Vu: A User Study-Using Images for Authentication
-
Usenix Assoc
-
R. Dhamija and A. Perrig, "Déjà Vu: A User Study-Using Images for Authentication," Proc. 9th Usenix Security Symp., Usenix Assoc., 2000, pp. 45-58.
-
(2000)
Proc. 9th Usenix Security Symp
, pp. 45-58
-
-
Dhamija, R.1
Perrig, A.2
-
10
-
-
41949107094
-
-
K. Cameron, Laws of Identity, blog, May 2005; w w.identityblog.com/stories/2004/12/09/thelaws.html.
-
K. Cameron, "Laws of Identity," blog, May 2005; w w.identityblog.com/stories/2004/12/09/thelaws.html.
-
-
-
-
11
-
-
41949104992
-
-
blog, 19 June
-
E. Maler, "r-e-s-p-e-c-t," blog, 19 June 2006; www.xinlgrrl.com/blog/archives/2006/06/19/r-e-s-p-e-c-t/.
-
(2006)
r-e-s-p-e-c-t
-
-
Maler, E.1
-
12
-
-
77953767524
-
Stopping Spyware at the Gate: A User Study of Privacy, Notice, and Spyware
-
ACM Press
-
N. Good et al., "Stopping Spyware at the Gate: A User Study of Privacy, Notice, and Spyware," Proc. Symp. Usable Privacy and Security (SOUPS 05), ACM Press, 2005, pp. 43-52.
-
(2005)
Proc. Symp. Usable Privacy and Security (SOUPS 05)
, pp. 43-52
-
-
Good, N.1
-
13
-
-
38549085605
-
Empirical Studies on Software Notices to Inform Policy Makers and Usability Designers
-
Proc. Usable Security USEC 07, Springer
-
J. Grossklags and N. Good, "Empirical Studies on Software Notices to Inform Policy Makers and Usability Designers," Proc. Usable Security (USEC 07), Lecture Notes in Computer Science, Springer, 2007.
-
(2007)
Lecture Notes in Computer Science
-
-
Grossklags, J.1
Good, N.2
-
14
-
-
41949088647
-
Attention Switch and Maintenance
-
M.S. Wogalter, ed, Lawrence Erlbaum Assoc
-
M.S. Wogalter and W.J. Vigilante, "Attention Switch and Maintenance," Handbook of Warnings, M.S. Wogalter, ed., Lawrence Erlbaum Assoc., 2006, pp. 245-265.
-
(2006)
Handbook of Warnings
, pp. 245-265
-
-
Wogalter, M.S.1
Vigilante, W.J.2
-
15
-
-
0020112113
-
Design Rules Based on Analyses of Human Error
-
D.A. Norman, Design Rules Based on Analyses of Human Error," Comm. ACM, vol. 26, no. 4, 1983, pp. 254-258.
-
(1983)
Comm. ACM
, vol.26
, Issue.4
, pp. 254-258
-
-
Norman, D.A.1
-
16
-
-
1842639407
-
The Tyranny of Choice
-
Apr
-
B. Schwartz, "The Tyranny of Choice," Scientific Am., Apr. 2004, pp. 71-75.
-
(2004)
Scientific Am
, pp. 71-75
-
-
Schwartz, B.1
-
19
-
-
41949129914
-
-
Privacy Rights Clearinghouse, Chronology of Data Breaches, www.privacyrights.org/ar/ChronDataBreaches.htm.
-
Privacy Rights Clearinghouse, Chronology of Data Breaches, www.privacyrights.org/ar/ChronDataBreaches.htm.
-
-
-
-
20
-
-
41949103452
-
What Happened in Vegas
-
31 May 2007;
-
R. Stern, "What Happened in Vegas...," Phoenix New Times, 31 May 2007; www.phoenixnewtimes.com/2007-05-31/news/what-happened- in-vegas/full.
-
Phoenix New Times
-
-
Stern, R.1
|