-
1
-
-
0043232732
-
Users are not the enemy
-
Adams, A. and Sasse, A.S. Users are not the enemy. Commun. ACM 42, (1999) 40-46.
-
(1999)
Commun. ACM
, vol.42
, pp. 40-46
-
-
Adams, A.1
Sasse, A.S.2
-
2
-
-
84986346822
-
The differential impact of abstract vs. concrete information on decisions
-
Borgida, E., and Nisbett, R.E. The differential impact of abstract vs. concrete information on decisions. J. Applied Social Psychology 7 (1977) 258-271.
-
(1977)
J. Applied Social Psychology
, vol.7
, pp. 258-271
-
-
Borgida, E.1
Nisbett, R.E.2
-
3
-
-
33745816410
-
-
Dhamija, R., Tygar, J.D., and Hearst, M. Why phishing works. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Montreal, Quebec, Canada, Apr. 22-27, 2006). R. Grinter, T. Rodden, P. Aoki, E. Cutrell, R. Jeffries, and G. Olson, Eds. ACM, New York, 581-590.
-
Dhamija, R., Tygar, J.D., and Hearst, M. Why phishing works. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Montreal, Quebec, Canada, Apr. 22-27, 2006). R. Grinter, T. Rodden, P. Aoki, E. Cutrell, R. Jeffries, and G. Olson, Eds. ACM, New York, 581-590.
-
-
-
-
4
-
-
77953906935
-
Behavioral response to phishing risk
-
Pittsburgh, PA, Oct. 4-5, ACM, New York
-
Downs, J.S., Holbrook, M., and Cranor, L.F. Behavioral response to phishing risk. In Proceedings of the Anti-Phishing Working Groups 2nd Annual Ecrime Researchers Summit (Pittsburgh, PA, Oct. 4-5, 2007). ACM, New York, 37-44.
-
(2007)
Proceedings of the Anti-Phishing Working Groups 2nd Annual Ecrime Researchers Summit
, pp. 37-44
-
-
Downs, J.S.1
Holbrook, M.2
Cranor, L.F.3
-
5
-
-
29244472469
-
The user non-acceptance paradigm: INFOSECs dirty little secret
-
ACM, New York
-
Greenwald, S.J., Olthoff, K.G., Raskin, V., and Ruch, W. The user non-acceptance paradigm: INFOSECs dirty little secret. New Security Paradigms Workshop, 35-43. ACM, New York.
-
New Security Paradigms Workshop
, pp. 35-43
-
-
Greenwald, S.J.1
Olthoff, K.G.2
Raskin, V.3
Ruch, W.4
-
6
-
-
0002795580
-
Facts versus fears: Understanding perceived risks
-
D. Kahneman, P. Slovic, and A. Tversky, eds. Cambridge University Press, New York
-
Slovic, P., Fischhoff, B., and Lichtenstein, S. Facts versus fears: Understanding perceived risks. Judgment under Uncertainty: Heuristics and Biases. D. Kahneman, P. Slovic, and A. Tversky, eds. Cambridge University Press, New York, 1986, 463-489.
-
(1986)
Judgment under Uncertainty: Heuristics and Biases
, pp. 463-489
-
-
Slovic, P.1
Fischhoff, B.2
Lichtenstein, S.3
-
7
-
-
0038226921
-
Moving from the design of usable security technologies to the design of useful secure applications
-
ACM, New York
-
Smetters, D.K. and Grinter, R.E. Moving from the design of usable security technologies to the design of useful secure applications. New Security Paradigms Workshop. ACM, New York, 2002, 82-89.
-
(2002)
New Security Paradigms Workshop
, pp. 82-89
-
-
Smetters, D.K.1
Grinter, R.E.2
-
8
-
-
0001371984
-
Rational choice and the framing of decisions
-
Tversky, A. and Kahneman, D. Rational choice and the framing of decisions. J. Business 59 (1986), 251-278.
-
(1986)
J. Business
, vol.59
, pp. 251-278
-
-
Tversky, A.1
Kahneman, D.2
-
9
-
-
85084161247
-
Why Johnny can't encrypt: A usability evaluation of PGP 5.0
-
USENIX Association, Berkeley, CA
-
Whitten, A. and Tygar J.D. Why Johnny can't encrypt: A usability evaluation of PGP 5.0. In Proceedings of the 8th USENIX Security Symposium (1999). USENIX Association, Berkeley, CA, 169-184.
-
(1999)
Proceedings of the 8th USENIX Security Symposium
, pp. 169-184
-
-
Whitten, A.1
Tygar, J.D.2
-
10
-
-
0001026839
-
The harassed decision maker: Timer pressure, distractions, and the use of evidence
-
Wright, P. The harassed decision maker: Timer pressure, distractions, and the use of evidence. J. Applied Psychology 59, (1974), 555-561.
-
(1974)
J. Applied Psychology
, vol.59
, pp. 555-561
-
-
Wright, P.1
|