-
2
-
-
0242444871
-
Making passwords secure and usable
-
Thimbleby H., O'Conaill B., and Thomas P. (Eds), Springer, Bristol
-
Adams A., Sasse M.A., and Lunt P. Making passwords secure and usable. In: Thimbleby H., O'Conaill B., and Thomas P. (Eds). People & computers XII, proceedings of HCI'97 (1997), Springer, Bristol 1-19
-
(1997)
People & computers XII, proceedings of HCI'97
, pp. 1-19
-
-
Adams, A.1
Sasse, M.A.2
Lunt, P.3
-
3
-
-
34249871944
-
A qualitative study of users' view on information security
-
Albrechtsen E. A qualitative study of users' view on information security. Computers & Security 26 4 (2007) 276-289
-
(2007)
Computers & Security
, vol.26
, Issue.4
, pp. 276-289
-
-
Albrechtsen, E.1
-
4
-
-
2342598277
-
Computer security impaired by legitimate users
-
Besnard D., and Arief B. Computer security impaired by legitimate users. Computers & Security 23 (2004) 253-264
-
(2004)
Computers & Security
, vol.23
, pp. 253-264
-
-
Besnard, D.1
Arief, B.2
-
8
-
-
23044525969
-
Current directions in IS security research: towards socio-organizational perspectives
-
Dhillon G., and Backhouse J. Current directions in IS security research: towards socio-organizational perspectives. Information Systems Journal 11 (2001) 127-153
-
(2001)
Information Systems Journal
, vol.11
, pp. 127-153
-
-
Dhillon, G.1
Backhouse, J.2
-
9
-
-
0001797456
-
The interview: from structured questions to negotiated text
-
Denzin N.K., and Lincoln N.K. (Eds), Sage Publications, Inc., Thousand Oaks
-
Fontana A., and Frey J.H. The interview: from structured questions to negotiated text. In: Denzin N.K., and Lincoln N.K. (Eds). Handbook of qualitative research (2000), Sage Publications, Inc., Thousand Oaks 645-672
-
(2000)
Handbook of qualitative research
, pp. 645-672
-
-
Fontana, A.1
Frey, J.H.2
-
10
-
-
0042363355
-
The application of information security policies in large UK-based organizations: an exploratory investigation
-
Fulford H., and Doherty N.F. The application of information security policies in large UK-based organizations: an exploratory investigation. Information Management & Computer Security 11 3 (2003) 106-114
-
(2003)
Information Management & Computer Security
, vol.11
, Issue.3
, pp. 106-114
-
-
Fulford, H.1
Doherty, N.F.2
-
11
-
-
34547950128
-
Making security usable: are things improving?
-
Furnell S. Making security usable: are things improving?. Computers & Security 26 6 (2007) 434-443
-
(2007)
Computers & Security
, vol.26
, Issue.6
, pp. 434-443
-
-
Furnell, S.1
-
13
-
-
57849132173
-
Why Johnny can't surf (safely)? Attacks and defenses for web users
-
Herzberg A. Why Johnny can't surf (safely)? Attacks and defenses for web users. Computers & Security 28 1-2 (2009) 63-71
-
(2009)
Computers & Security
, vol.28
, Issue.1-2
, pp. 63-71
-
-
Herzberg, A.1
-
15
-
-
33750529997
-
Using a "common language" for computer security incident information
-
Bosworth S., and Kabay M.E. (Eds), John Wiley & Sons, New York
-
Howard J.D., and Meunier P. Using a "common language" for computer security incident information. In: Bosworth S., and Kabay M.E. (Eds). Computer security handbook (2002), John Wiley & Sons, New York 3.1-3.22
-
(2002)
Computer security handbook
-
-
Howard, J.D.1
Meunier, P.2
-
16
-
-
18844431067
-
Information systems security policies: a contextual perspective
-
Karyda M., Kiountouzis E., and Kokolakis S. Information systems security policies: a contextual perspective. Computers & Security 24 (2005) 246-260
-
(2005)
Computers & Security
, vol.24
, pp. 246-260
-
-
Karyda, M.1
Kiountouzis, E.2
Kokolakis, S.3
-
17
-
-
33644533141
-
Information security: management's effect on culture and policy
-
Knapp K., Marshall T.E., Rainer R.K., and Ford F.N. Information security: management's effect on culture and policy. Information Management & Computer Security 14 1 (2006) 24-36
-
(2006)
Information Management & Computer Security
, vol.14
, Issue.1
, pp. 24-36
-
-
Knapp, K.1
Marshall, T.E.2
Rainer, R.K.3
Ford, F.N.4
-
18
-
-
33750510560
-
-
Kraemer S, Carayon P. Computer and information security culture: findings from two studies. In: Human Factors and Ergonomics Society, editor. Proceedings of the human factors and ergonomics society. Orlando, Florida; 2005. p. 1483-87.
-
Kraemer S, Carayon P. Computer and information security culture: findings from two studies. In: Human Factors and Ergonomics Society, editor. Proceedings of the human factors and ergonomics society. Orlando, Florida; 2005. p. 1483-87.
-
-
-
-
19
-
-
33750513188
-
Human errors and violations in computer and information security: the viewpoint of network administrators and security specialists
-
Kraemer S., and Carayon P. Human errors and violations in computer and information security: the viewpoint of network administrators and security specialists. Applied Ergonomics 38 2 (2007) 143-154
-
(2007)
Applied Ergonomics
, vol.38
, Issue.2
, pp. 143-154
-
-
Kraemer, S.1
Carayon, P.2
-
21
-
-
63049132678
-
How significant is human error as a cause of privacy breaches? An empirical stud and framework for error management
-
Liginlal D., Sim I., and Khansa L. How significant is human error as a cause of privacy breaches? An empirical stud and framework for error management. Computers & Security 28 (2009) 215-228
-
(2009)
Computers & Security
, vol.28
, pp. 215-228
-
-
Liginlal, D.1
Sim, I.2
Khansa, L.3
-
23
-
-
84977349714
-
Case and situational analysis
-
Mitchell J.C. Case and situational analysis. Sociological Review 31 2 (1983) 87-211
-
(1983)
Sociological Review
, vol.31
, Issue.2
, pp. 87-211
-
-
Mitchell, J.C.1
-
25
-
-
0003594156
-
-
Morgan D.L. (Ed), Sage Publications, Inc., Newbury Park
-
In: Morgan D.L. (Ed). Focus groups as qualitative research, vol. 16 (1988), Sage Publications, Inc., Newbury Park
-
(1988)
Focus groups as qualitative research, vol. 16
-
-
-
29
-
-
0011243622
-
Risk management, adaption, and design for safety
-
Brehmer B., and Sahlin N.-E. (Eds), Kluwer Academic Publishers, Dordrecht
-
Rasmussen J. Risk management, adaption, and design for safety. In: Brehmer B., and Sahlin N.-E. (Eds). Future risks and risk management (1994), Kluwer Academic Publishers, Dordrecht 1-36
-
(1994)
Future risks and risk management
, pp. 1-36
-
-
Rasmussen, J.1
-
32
-
-
85008145482
-
Macroergonomic methods: assessing work system processes
-
Hendrick H.W., and Kleiner B. (Eds), Lawrence Erlbaum Associates, Mahweh, New Jersey
-
Robertson M.M., Kleiner B., and O'Neill M.J. Macroergonomic methods: assessing work system processes. In: Hendrick H.W., and Kleiner B. (Eds). Marcroergonomics: theory, methods, and applications (2002), Lawrence Erlbaum Associates, Mahweh, New Jersey 67-96
-
(2002)
Marcroergonomics: theory, methods, and applications
, pp. 67-96
-
-
Robertson, M.M.1
Kleiner, B.2
O'Neill, M.J.3
-
33
-
-
33846849570
-
Organisational security culture: extending the end-user perspective
-
Ruighaver A.B., Maynard S.B., and Chang S. Organisational security culture: extending the end-user perspective. Computers & Security 26 1 (2007) 56-62
-
(2007)
Computers & Security
, vol.26
, Issue.1
, pp. 56-62
-
-
Ruighaver, A.B.1
Maynard, S.B.2
Chang, S.3
-
34
-
-
0002815632
-
Data management and analysis methods
-
Denzin N.K., and Lincoln Y.S. (Eds), Sage Publications, Inc., Thousand Oaks
-
Ryan G.W., and Bernard H.R. Data management and analysis methods. In: Denzin N.K., and Lincoln Y.S. (Eds). Handbook of qualitative research (2000), Sage Publications, Inc., Thousand Oaks 769-801
-
(2000)
Handbook of qualitative research
, pp. 769-801
-
-
Ryan, G.W.1
Bernard, H.R.2
-
36
-
-
84908163541
-
Modeling security management of information systems: Analysis of a ongoing practical case
-
Nijmegen, The Netherlands;
-
Sarriegi JM, Santos J, Torres JM, Imizcoz D, Plandolit A. Modeling security management of information systems: analysis of a ongoing practical case. In: The 24th international conference of the system dynamics society. Nijmegen, The Netherlands; 2006.
-
(2006)
The 24th international conference of the system dynamics society
-
-
Sarriegi, J.M.1
Santos, J.2
Torres, J.M.3
Imizcoz, D.4
Plandolit, A.5
-
38
-
-
24644438691
-
The human factor in security
-
Schultz E. The human factor in security. Computers & Security 24 6 (2005) 425-426
-
(2005)
Computers & Security
, vol.24
, Issue.6
, pp. 425-426
-
-
Schultz, E.1
-
40
-
-
0033683516
-
A conceptual foundation for organizational information security awareness
-
Siponen M.T. A conceptual foundation for organizational information security awareness. Information Management & Computer Security 8 1 (2000) 31-41
-
(2000)
Information Management & Computer Security
, vol.8
, Issue.1
, pp. 31-41
-
-
Siponen, M.T.1
-
44
-
-
67650883222
-
An integrated view of human, organizational, and technological challenges of IT security management
-
Werlinger R., Hawkey K., and Beznosov K. An integrated view of human, organizational, and technological challenges of IT security management. Information Management & Computer Security 17 1 (2009) 4-49
-
(2009)
Information Management & Computer Security
, vol.17
, Issue.1
, pp. 4-49
-
-
Werlinger, R.1
Hawkey, K.2
Beznosov, K.3
-
45
-
-
2342492219
-
-
Carnegie Mellon University, School of Computer Science, Computer Science Department, Pittsburgh, PA
-
Whitten A., and Tygar J.D. Usability of security: a case study (1998), Carnegie Mellon University, School of Computer Science, Computer Science Department, Pittsburgh, PA
-
(1998)
Usability of security: a case study
-
-
Whitten, A.1
Tygar, J.D.2
-
47
-
-
84962284852
-
-
Wood BJ. Duggan R. Red teaming of advanced information assurance concepts. In: DISCEX2000 DARPA information survivability conference. Hilton Head, South Carolina; 1999. p. SAND99-2590C.
-
Wood BJ. Duggan R. Red teaming of advanced information assurance concepts. In: DISCEX2000 DARPA information survivability conference. Hilton Head, South Carolina; 1999. p. SAND99-2590C.
-
-
-
|