메뉴 건너뛰기




Volumn 7, Issue 3, 2009, Pages 64-67

Malicious interfaces and personalization's uninviting future

Author keywords

Adversarial interface design; Design principles; Evil interfaces; Malicious interfaces; Privacy; Privacy interests; Security amp; privacy; Web usability

Indexed keywords

ADVERSARIAL INTERFACE DESIGN; DESIGN PRINCIPLES; EVIL INTERFACES; MALICIOUS INTERFACES; PRIVACY; PRIVACY INTERESTS; WEB USABILITY;

EID: 67650803094     PISSN: 15407993     EISSN: None     Source Type: Journal    
DOI: 10.1109/MSP.2009.71     Document Type: Article
Times cited : (3)

References (11)
  • 3
    • 34848911641 scopus 로고    scopus 로고
    • Social Phishing
    • T. Jagatic et al., "Social Phishing ," Comm. ACM, vol. 50, no. 10, 2007, pp. 94-100.
    • (2007) Comm. ACM , vol.50 , Issue.10 , pp. 94-100
    • Jagatic, T.1
  • 4
    • 30344447665 scopus 로고    scopus 로고
    • A Framework for Countering Denial of Information Attacks
    • G. Conti and M. Ahamad, "A Framework for Countering Denial of Information Attacks," IEEE Security & Privacy, vol. 3, no. 6, 2005, pp. 50-56.
    • (2005) IEEE Security & Privacy , vol.3 , Issue.6 , pp. 50-56
    • Conti, G.1    Ahamad, M.2
  • 5
    • 0242527443 scopus 로고    scopus 로고
    • Guarding the Next Internet Frontier: Countering Denial of Information Attacks
    • ACM Press
    • M. Ahamad et al., "Guarding the Next Internet Frontier: Countering Denial of Information Attacks," Proc. New Sec ur ity Paradigms Workshop, ACM Press, 2002, pp. 136-143.
    • (2002) Proc. New Sec ur ity Paradigms Workshop , pp. 136-143
    • Ahamad, M.1
  • 6
    • 77953779300 scopus 로고    scopus 로고
    • Attacking Information Visualization System Usability: Overloading and Deceiving the Human
    • ACM Press
    • G. Conti, M. Ahamad, and J. Stasko, "Attacking Information Visualization System Usability: Overloading and Deceiving the Human," Proc. Symp. Usable Privacy and Security (SOUPS 05), ACM Press, 2005, pp. 89-100.
    • (2005) Proc. Symp. Usable Privacy and Security (SOUPS 05) , pp. 89-100
    • Conti, G.1    Ahamad, M.2    Stasko, J.3
  • 7
    • 84869529444 scopus 로고    scopus 로고
    • Evil Interfaces: Violating the User
    • July 2008;
    • G. Conti, "Evil Interfaces: Violating the User," Hackers on Planet Earth (HOPE), July 2008; www. thelasthope.org/talks.html.
    • Hackers on Planet Earth (HOPE)
    • Conti, G.1
  • 8
    • 84876628539 scopus 로고    scopus 로고
    • Hackers Assault Epilepsy Patients via Computer
    • 28 Mar. 2008;
    • K. Poulsen, "Hackers Assault Epilepsy Patients via Computer," Wired, 28 Mar. 2008; www.wired. com/politics/security/news/ 2008/03/epilepsy.
    • Wired
    • Poulsen, K.1
  • 9
    • 59449102311 scopus 로고    scopus 로고
    • Future Tense: Pester Power
    • C. Doctorow, "Future Tense: Pester Power," Comm. ACM, vol. 51, no. 12, 2008, pp. 119-120.
    • (2008) Comm. ACM , vol.51 , Issue.12 , pp. 119-120
    • Doctorow, C.1
  • 10
    • 34250022445 scopus 로고    scopus 로고
    • The Cost of Free Web Tools
    • E. Sobiesk and G. Conti, "The Cost of Free Web Tools," IEEE Security & Privacy, vol. 5, no. 3, 2007, pp. 66-68.
    • (2007) IEEE Security & Privacy , vol.5 , Issue.3 , pp. 66-68
    • Sobiesk, E.1    Conti, G.2
  • 11
    • 84869524983 scopus 로고    scopus 로고
    • Google's Goal: To Organise Your Daily Life
    • 22 May 2007;
    • C. Daniel and M. Palmer, "Google's Goal: To Organise Your Daily Life," Financial Times Online, 22 May 2007; www. ft.com/cms/s/2/c3e49548-088e-11dc-b11e-000b5df10621.html.
    • Financial Times Online
    • Daniel, C.1    Palmer, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.