메뉴 건너뛰기




Volumn 51, Issue 4, 2008, Pages 34-40

The psychology of security

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER AIDED SOFTWARE ENGINEERING; INTERACTIVE COMPUTER SYSTEMS; RISK ANALYSIS; SECURITY SYSTEMS; UNCERTAINTY ANALYSIS; USER INTERFACES;

EID: 42149161709     PISSN: 00010782     EISSN: 15577317     Source Type: Journal    
DOI: 10.1145/1330311.1330320     Document Type: Article
Times cited : (218)

References (12)
  • 1
    • 0043232732 scopus 로고    scopus 로고
    • Users are not the enemy
    • Adams, A. and Sasse, A.S. Users are not the enemy. Commun. ACM 42, (1999) 40-46.
    • (1999) Commun. ACM , vol.42 , pp. 40-46
    • Adams, A.1    Sasse, A.S.2
  • 2
    • 84986346822 scopus 로고
    • The differential impact of abstract vs. concrete information on decisions
    • Borgida, E., and Nisbett, R.E. The differential impact of abstract vs. concrete information on decisions. J. Applied Social Psychology 7 (1977) 258-271.
    • (1977) J. Applied Social Psychology , vol.7 , pp. 258-271
    • Borgida, E.1    Nisbett, R.E.2
  • 3
    • 33745816410 scopus 로고    scopus 로고
    • Dhamija, R., Tygar, J.D., and Hearst, M. Why phishing works. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Montreal, Quebec, Canada, Apr. 22-27, 2006). R. Grinter, T. Rodden, P. Aoki, E. Cutrell, R. Jeffries, and G. Olson, Eds. ACM, New York, 581-590.
    • Dhamija, R., Tygar, J.D., and Hearst, M. Why phishing works. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Montreal, Quebec, Canada, Apr. 22-27, 2006). R. Grinter, T. Rodden, P. Aoki, E. Cutrell, R. Jeffries, and G. Olson, Eds. ACM, New York, 581-590.
  • 6
    • 0002795580 scopus 로고
    • Facts versus fears: Understanding perceived risks
    • D. Kahneman, P. Slovic, and A. Tversky, eds. Cambridge University Press, New York
    • Slovic, P., Fischhoff, B., and Lichtenstein, S. Facts versus fears: Understanding perceived risks. Judgment under Uncertainty: Heuristics and Biases. D. Kahneman, P. Slovic, and A. Tversky, eds. Cambridge University Press, New York, 1986, 463-489.
    • (1986) Judgment under Uncertainty: Heuristics and Biases , pp. 463-489
    • Slovic, P.1    Fischhoff, B.2    Lichtenstein, S.3
  • 7
    • 0038226921 scopus 로고    scopus 로고
    • Moving from the design of usable security technologies to the design of useful secure applications
    • ACM, New York
    • Smetters, D.K. and Grinter, R.E. Moving from the design of usable security technologies to the design of useful secure applications. New Security Paradigms Workshop. ACM, New York, 2002, 82-89.
    • (2002) New Security Paradigms Workshop , pp. 82-89
    • Smetters, D.K.1    Grinter, R.E.2
  • 8
    • 0001371984 scopus 로고
    • Rational choice and the framing of decisions
    • Tversky, A. and Kahneman, D. Rational choice and the framing of decisions. J. Business 59 (1986), 251-278.
    • (1986) J. Business , vol.59 , pp. 251-278
    • Tversky, A.1    Kahneman, D.2
  • 9
    • 85084161247 scopus 로고    scopus 로고
    • Why Johnny can't encrypt: A usability evaluation of PGP 5.0
    • USENIX Association, Berkeley, CA
    • Whitten, A. and Tygar J.D. Why Johnny can't encrypt: A usability evaluation of PGP 5.0. In Proceedings of the 8th USENIX Security Symposium (1999). USENIX Association, Berkeley, CA, 169-184.
    • (1999) Proceedings of the 8th USENIX Security Symposium , pp. 169-184
    • Whitten, A.1    Tygar, J.D.2
  • 10
    • 0001026839 scopus 로고
    • The harassed decision maker: Timer pressure, distractions, and the use of evidence
    • Wright, P. The harassed decision maker: Timer pressure, distractions, and the use of evidence. J. Applied Psychology 59, (1974), 555-561.
    • (1974) J. Applied Psychology , vol.59 , pp. 555-561
    • Wright, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.