-
2
-
-
0038588452
-
Privacy in multimedia communications: Protecting users, not just data
-
Blandford, A, Vanderdonkt, J, Gray, P, Eds, Lille, September, Springer, pp
-
Adams, A., Sasse, M., 2001. Privacy in multimedia communications: protecting users, not just data. In: Blandford, A., Vanderdonkt, J., Gray, P. (Eds.), People and Computers XV - Interaction Without Frontiers. Joint Proceedings of HCI2001 and ICM2001, Lille, September 2001, Springer, pp. 49-64.
-
(2001)
People and Computers XV - Interaction Without Frontiers. Joint Proceedings of HCI2001 and ICM2001
, pp. 49-64
-
-
Adams, A.1
Sasse, M.2
-
3
-
-
21344459955
-
Structures of responsibilities and security of information systems
-
Backhouse J., and Dhillon G. Structures of responsibilities and security of information systems. European Journal of Information Systems 5 1 (1996) 2-9
-
(1996)
European Journal of Information Systems
, vol.5
, Issue.1
, pp. 2-9
-
-
Backhouse, J.1
Dhillon, G.2
-
4
-
-
24044550516
-
Rethinking the concept of user involvement
-
March, Society for Information Management and The Management Information Systems Research Center, Minneapolis, MN, USA, pp
-
Barki, H., Hartwick, J., 1989. Rethinking the concept of user involvement. In: MIS Quarterly, March, vol. 13 (1). Society for Information Management and The Management Information Systems Research Center, Minneapolis, MN, USA, pp. 53-63.
-
(1989)
MIS Quarterly
, vol.13
, Issue.1
, pp. 53-63
-
-
Barki, H.1
Hartwick, J.2
-
5
-
-
59649100150
-
-
Baskerville, R., 1999. Investigating informations systems with action research. In: Communications of AIS, 2, Article 19. Association for Information Systems, Atlanta, GA, USA, p. 4.
-
Baskerville, R., 1999. Investigating informations systems with action research. In: Communications of AIS, vol. 2, Article 19. Association for Information Systems, Atlanta, GA, USA, p. 4.
-
-
-
-
7
-
-
59649091371
-
-
Butler, S., 2000. Security design: Why it's hard to do empirical research. URL 〈http://www-2.cs.cmu.edu/~Vit/paperabstracts/secure.butler.html〉.
-
Butler, S., 2000. Security design: Why it's hard to do empirical research. URL 〈http://www-2.cs.cmu.edu/~Vit/paperabstracts/secure.butler.html〉.
-
-
-
-
8
-
-
79551470060
-
A case study of user participation in the information systems development process
-
Association for Information Systems, Atlanta, GA, USA, pp
-
Butler, T., Fitzgerald, B., 1997. A case study of user participation in the information systems development process. In: ICIS '97: Proceedings of the Eighteenth International Conference on Information Systems. Association for Information Systems, Atlanta, GA, USA, pp. 411-426.
-
(1997)
ICIS '97: Proceedings of the Eighteenth International Conference on Information Systems
, pp. 411-426
-
-
Butler, T.1
Fitzgerald, B.2
-
9
-
-
59649125480
-
-
CLEF, URL
-
CLEF, 2004. Clinical e-science Framework. URL 〈http://www.clinical-escience.org/〉.
-
(2004)
Clinical e-science Framework
-
-
-
10
-
-
0002447216
-
Norms and normative behaviour: field studies of social interdependence
-
Academic Press, New York
-
Darley J., and Latané B. Norms and normative behaviour: field studies of social interdependence. Altruism and Helping Behaviour (1970), Academic Press, New York 83-101
-
(1970)
Altruism and Helping Behaviour
, pp. 83-101
-
-
Darley, J.1
Latané, B.2
-
11
-
-
34548176302
-
-
URL
-
Department of Trade and Industry, 2006. Information Security Breaches Survey. URL 〈http://www.pwc.com/uk/eng/ins-sol/publ/pwcdti-fullsurveyresults06.pdf〉.
-
(2006)
Information Security Breaches Survey
-
-
-
12
-
-
23044525969
-
Current directions in is security research: towards socio-organizational perspectives
-
Dhillon G., and Backhouse J. Current directions in is security research: towards socio-organizational perspectives. Information Systems Journal 11 (2001) 127-153
-
(2001)
Information Systems Journal
, vol.11
, pp. 127-153
-
-
Dhillon, G.1
Backhouse, J.2
-
14
-
-
17644401409
-
Bringing security home: A process for developing secure and usable systems
-
ACM Press, New York, USA, pp
-
Flechais, I., Sasse, M., Hailes, S. M., 2003. Bringing security home: a process for developing secure and usable systems. In: New Security Paradigms Workshop. ACM Press, New York, USA, pp. 49-57.
-
(2003)
New Security Paradigms Workshop
, pp. 49-57
-
-
Flechais, I.1
Sasse, M.2
Hailes, S.M.3
-
16
-
-
59649124670
-
Small world, water coolers, and the challenge of remote collaboration
-
ACM Press, New York, USA
-
Gorlenko L. Small world, water coolers, and the challenge of remote collaboration. Interactions vol. 12 (6) (2005), ACM Press, New York, USA 42-44
-
(2005)
Interactions
, vol.12 6
, pp. 42-44
-
-
Gorlenko, L.1
-
17
-
-
7744232178
-
A practical solution to the complex human issues of information security design
-
Katsikas S.K., and Gritzalis D. (Eds), Chapman & Hall, Ltd., London
-
Hitchings J. A practical solution to the complex human issues of information security design. In: Katsikas S.K., and Gritzalis D. (Eds). Information Systems Security: Facing the Information Society of the 21st Century, IFIP Conference Proceedings vol. 54 (1996), Chapman & Hall, Ltd., London 3-12
-
(1996)
Information Systems Security: Facing the Information Society of the 21st Century, IFIP Conference Proceedings
, vol.54
, pp. 3-12
-
-
Hitchings, J.1
-
18
-
-
23944441991
-
The impact of participation in information system design: A comparison of contextual placements
-
ACM Press, New York, USA
-
Irestig M., Eriksson H., and Timpka T. The impact of participation in information system design: A comparison of contextual placements. PDC 04: Proceedings of the Eighth Conference on Participatory design (2004), ACM Press, New York, USA 102-111
-
(2004)
PDC 04: Proceedings of the Eighth Conference on Participatory design
, pp. 102-111
-
-
Irestig, M.1
Eriksson, H.2
Timpka, T.3
-
19
-
-
84994768852
-
Managing information systems security: A soft approach
-
96, IEEE Computer Society, October 30-31
-
James, H. L., 1996. Managing information systems security: a soft approach. In: Proceedings of the 1996 Information Systems Conference of New Zealand, ISCNZ '96, IEEE Computer Society, October 30-31, 1996, pp. 10-20.
-
(1996)
Proceedings of the 1996 Information Systems Conference of New Zealand, ISCNZ
, pp. 10-20
-
-
James, H.L.1
-
20
-
-
84944056366
-
User interaction design for secure systems
-
Springer, London, UK, pp, URL
-
Ka-Ping, Y., 2002. User interaction design for secure systems. In: ICICS '02: Proceedings of the 4th International Conference on Information and Communications Security, Springer, London, UK, pp. 278-290. URL 〈http://zesty.ca/sid〉.
-
(2002)
ICICS '02: Proceedings of the 4th International Conference on Information and Communications Security
, pp. 278-290
-
-
Ka-Ping, Y.1
-
25
-
-
0041091236
-
Managing the change to an automated office: lessons from five case studies
-
Rousseau D. Managing the change to an automated office: lessons from five case studies. Office: Technology & People 4 (1989) 31-52
-
(1989)
Office: Technology & People
, vol.4
, pp. 31-52
-
-
Rousseau, D.1
-
26
-
-
0016555241
-
The protection of information in computer systems
-
Saltzer J., and Schroeder M. The protection of information in computer systems. Proceeding of the IEEE 63 9 (1975) 1278-1308
-
(1975)
Proceeding of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.1
Schroeder, M.2
-
27
-
-
35348863698
-
Usable security: What is it? how do we get it?
-
Cranor, L. F, Garfinkel, S, Eds, O'Reilly Books, pp
-
Sasse, M., Flechais, I., 2005. Usable security: What is it? how do we get it? In: Cranor, L. F., Garfinkel, S. (Eds.), Security and Usability: Designing Secure Systems that People can Use. O'Reilly Books, pp. 13-30.
-
(2005)
Security and Usability: Designing Secure Systems that People can Use
, pp. 13-30
-
-
Sasse, M.1
Flechais, I.2
-
28
-
-
0011644488
-
An analysis of the recent is security development approaches: Descriptive and prescriptive implications
-
Idea Group Publishing, pp
-
Siponen, M. T., 2001. An analysis of the recent is security development approaches: Descriptive and prescriptive implications. In: Information Security Management: Global Challenges in the New Millennium, Idea Group Publishing, pp. 101-123.
-
(2001)
Information Security Management: Global Challenges in the New Millennium
, pp. 101-123
-
-
Siponen, M.T.1
-
29
-
-
84904255922
-
-
Siponen, M., Baskerville, R., 2001. A new paradigm for adding security into IS development methods. In: Proceedings of the IFIP TC11 WG11.1/WG11.2 Eighth Annual Working Conference on Advances in Information Security Management & Small Systems Security, Kluwer, B.V., Deventer, The Netherlands, pp. 99-112.
-
Siponen, M., Baskerville, R., 2001. A new paradigm for adding security into IS development methods. In: Proceedings of the IFIP TC11 WG11.1/WG11.2 Eighth Annual Working Conference on Advances in Information Security Management & Small Systems Security, Kluwer, B.V., Deventer, The Netherlands, pp. 99-112.
-
-
-
-
30
-
-
0001133137
-
Coping with systems risk: Security planning models for managerial decision-making
-
Straub D.W., and Welke R.J. Coping with systems risk: Security planning models for managerial decision-making. MIS Quarterly 22 4 (1998) 441-469
-
(1998)
MIS Quarterly
, vol.22
, Issue.4
, pp. 441-469
-
-
Straub, D.W.1
Welke, R.J.2
-
31
-
-
55249119617
-
The effect of user involvement on system success: A contingency approach
-
Tait P., and Vessey I. The effect of user involvement on system success: A contingency approach. MIS Quarterly 12 1 (1988) 91-107
-
(1988)
MIS Quarterly
, vol.12
, Issue.1
, pp. 91-107
-
-
Tait, P.1
Vessey, I.2
-
32
-
-
85084161247
-
Why johnny can't encrypt: A usability evaluation of PGP 5.0
-
Whitten, A., Tygar, J., 1999. Why johnny can't encrypt: a usability evaluation of PGP 5.0. In: Proceedings of the 8th USENIX Security Symposium, Washington, DC, August 23-36, 1999, pp. 169-184.
-
(1999)
Proceedings of the 8th USENIX Security Symposium, Washington, DC, August 23-36
, pp. 169-184
-
-
Whitten, A.1
Tygar, J.2
|