-
3
-
-
70350743534
-
-
G. Chen and D. Kotz. A survey of context-aware mobile computing research. Technical Report TR2000-381, Dartmouth College, 2000.
-
G. Chen and D. Kotz. A survey of context-aware mobile computing research. Technical Report TR2000-381, Dartmouth College, 2000.
-
-
-
-
4
-
-
70350738887
-
-
S. Chiasson, P. C. van Oorschot, and R. Biddle. Even experts deserve usable security: Design guidelines for security management systems. In SOUPS Workshop on Usable IT Security Management (USM), pages 1{4, Pittsburgh, PA, July 2007.
-
S. Chiasson, P. C. van Oorschot, and R. Biddle. Even experts deserve usable security: Design guidelines for security management systems. In SOUPS Workshop on Usable IT Security Management (USM), pages 1{4, Pittsburgh, PA, July 2007.
-
-
-
-
6
-
-
70350743533
-
-
L. F. Cranor. Designing a privacy preference specification interface: A case study. In Proceedings of the Workshop on Human-Computer Interaction and Security Systems, page 4 pages, 2003.
-
L. F. Cranor. Designing a privacy preference specification interface: A case study. In Proceedings of the Workshop on Human-Computer Interaction and Security Systems, page 4 pages, 2003.
-
-
-
-
7
-
-
84893108843
-
-
L. F. Cranor. A framework for reasoning about the human in the loop. In UPSEC'08: Proceedings of the 1st Conference on Usability, Psychology, and Security, pages 1{15, Berkeley, CA, USA, 2008. USENIX Association.
-
L. F. Cranor. A framework for reasoning about the human in the loop. In UPSEC'08: Proceedings of the 1st Conference on Usability, Psychology, and Security, pages 1{15, Berkeley, CA, USA, 2008. USENIX Association.
-
-
-
-
8
-
-
77953740422
-
Two experiences designing for effective security
-
Pittsburgh, Pennsylvania, ACM
-
R. de Paula, X. Ding, P. Dourish, K. Nies, B. Pillet, D. Redmiles, J. Ren, J. Rode, and R. S. Filho. Two experiences designing for effective security. In SOUPS '05: Proceedings of the 2005 Symposium On Usable Privacy and Security, pages 25-34, Pittsburgh, Pennsylvania, 2005. ACM.
-
(2005)
SOUPS '05: Proceedings of the 2005 Symposium On Usable Privacy and Security
, pp. 25-34
-
-
de Paula, R.1
Ding, X.2
Dourish, P.3
Nies, K.4
Pillet, B.5
Redmiles, D.6
Ren, J.7
Rode, J.8
Filho, R.S.9
-
9
-
-
84900482702
-
Security in the wild: User strategies for managing security as an everyday, practical problem
-
8(6):391{401
-
P. Dourish, R. E. Grinter, J. D. de la Flor, and M. Joseph. Security in the wild: user strategies for managing security as an everyday, practical problem. Personal and Ubiquitous Computing, 8(6):391{401, 2004.
-
(2004)
Personal and Ubiquitous Computing
-
-
Dourish, P.1
Grinter, R.E.2
de la Flor, J.D.3
Joseph, M.4
-
11
-
-
84883288662
-
-
W. Geng, S. Flinn, and J. DeDourek. Usable firewall configuration. In PST '05: Proceedings of the 3rd Annual Conference on Privacy, Security and Trust, page 11 pages, 2005.
-
W. Geng, S. Flinn, and J. DeDourek. Usable firewall configuration. In PST '05: Proceedings of the 3rd Annual Conference on Privacy, Security and Trust, page 11 pages, 2005.
-
-
-
-
12
-
-
36249015376
-
-
A. Herzog and N. Shahmehri. Usability and security of personal firewalls. New Approaches for Security, Privacy and Trust in Complex Environments, pages 37-48, 2007.
-
A. Herzog and N. Shahmehri. Usability and security of personal firewalls. New Approaches for Security, Privacy and Trust in Complex Environments, pages 37-48, 2007.
-
-
-
-
13
-
-
77953077196
-
-
A. Herzog and N. Shahmehri. User help techniques for usable security. In CHIMIT '07: Proceedings of the 2007 symposium on Computer Human Interaction for the Management of Information Technology, pages 93{102, Cambridge, Massachusetts, 2007. ACM.
-
A. Herzog and N. Shahmehri. User help techniques for usable security. In CHIMIT '07: Proceedings of the 2007 symposium on Computer Human Interaction for the Management of Information Technology, pages 93{102, Cambridge, Massachusetts, 2007. ACM.
-
-
-
-
14
-
-
33750091040
-
Bringing the user back into control: A new paradigm for usability in highly dynamic systems
-
S. Hohn. Bringing the user back into control: A new paradigm for usability in highly dynamic systems. Lecture notes in computer science, pages 114-122, 2006.
-
(2006)
Lecture notes in computer science
, pp. 114-122
-
-
Hohn, S.1
-
18
-
-
0004057785
-
International Encyclopedia of Ergonomics and Human Factors
-
Second Edition, CRC Press, Inc, Boca Raton, FL, USA
-
W. Karwowski. International Encyclopedia of Ergonomics and Human Factors, Second Edition - 3 Volume Set. CRC Press, Inc., Boca Raton, FL, USA, 2006.
-
(2006)
3 Volume Set
-
-
Karwowski, W.1
-
19
-
-
79958101213
-
when i am on wi-fi, i am fearless: Privacy concerns & practices in eeryday wi-fi use
-
New York, NY, USA, ACM
-
P. Klasnja, S. Consolvo, J. Jung, B. M. Greenstein, L. LeGrand, P. Powledge, and D. Wetherall. "when i am on wi-fi, i am fearless": privacy concerns & practices in eeryday wi-fi use. In CHI '09: Proceedings of the 27th international conference on Human factors in computing systems, pages 1993-2002, New York, NY, USA, 2009. ACM.
-
(2009)
CHI '09: Proceedings of the 27th international conference on Human factors in computing systems
, pp. 1993-2002
-
-
Klasnja, P.1
Consolvo, S.2
Jung, J.3
Greenstein, B.M.4
LeGrand, L.5
Powledge, P.6
Wetherall, D.7
-
21
-
-
0038494760
-
An evaluation of a multiple interface design solution for bloated software
-
New York, NY, USA, ACM
-
J. McGrenere, R. M. Baecker, and K. S. Booth. An evaluation of a multiple interface design solution for bloated software. In CHI '02: Proceedings of the SIGCHI conference on Human factors in computing systems, pages 164-170, New York, NY, USA, 2002. ACM.
-
(2002)
CHI '02: Proceedings of the SIGCHI conference on Human factors in computing systems
, pp. 164-170
-
-
McGrenere, J.1
Baecker, R.M.2
Booth, K.S.3
-
22
-
-
70350714851
-
-
Microsoft. Windows Vista Help: Choosing a network location
-
Microsoft. Windows Vista Help: Choosing a network location.
-
-
-
-
23
-
-
70350741798
-
-
Microsoft. Windows Vista Help: What is a firewall
-
Microsoft. Windows Vista Help: What is a firewall.
-
-
-
-
26
-
-
56449119921
-
-
R. W. Reeder, L. Bauer, L. F. Cranor, M. K. Reiter, K. Bacon, K. How, and H. Strong. Expandable grids for visualizing and authoring computer security policies. In CHI '08: Proceeding of the twenty-sixth annual SIGCHI conference on Human factors in computing systems, pages 1473{1482, New York, NY, USA, 2008. ACM.
-
R. W. Reeder, L. Bauer, L. F. Cranor, M. K. Reiter, K. Bacon, K. How, and H. Strong. Expandable grids for visualizing and authoring computer security policies. In CHI '08: Proceeding of the twenty-sixth annual SIGCHI conference on Human factors in computing systems, pages 1473{1482, New York, NY, USA, 2008. ACM.
-
-
-
-
27
-
-
34250879822
-
-
J. Rode, C. Johansson, P. DiGioia, R. S. Filho, K. Nies, D. H. Nguyen, J. Ren, P. Dourish, and D. Redmiles. Seeing further: extending visualization as a basis for usable security. In SOUPS '06: Proceedings of the second symposium on Usable privacy and security, pages 145{155, New York, NY, USA, 2006. ACM.
-
J. Rode, C. Johansson, P. DiGioia, R. S. Filho, K. Nies, D. H. Nguyen, J. Ren, P. Dourish, and D. Redmiles. Seeing further: extending visualization as a basis for usable security. In SOUPS '06: Proceedings of the second symposium on Usable privacy and security, pages 145{155, New York, NY, USA, 2006. ACM.
-
-
-
-
28
-
-
3042740017
-
Humans in the loop: Human-computer interaction and security
-
1(3):75{79, May-June
-
S. Smith. Humans in the loop: human-computer interaction and security. Security & Privacy, IEEE, 1(3):75{79, May-June 2003.
-
(2003)
Security & Privacy, IEEE
-
-
Smith, S.1
-
29
-
-
70350731536
-
-
J. Stoll, C. S. Tashman, W. K. Edwards, and K. Spafford. Sesame: informing user security decisions with system visualization. In CHI '08: Proceeding of the twenty-sixth annual SIGCHI conference on Human factors in computing systems, pages 1045{1054, New York, NY, USA, 2008. ACM.
-
J. Stoll, C. S. Tashman, W. K. Edwards, and K. Spafford. Sesame: informing user security decisions with system visualization. In CHI '08: Proceeding of the twenty-sixth annual SIGCHI conference on Human factors in computing systems, pages 1045{1054, New York, NY, USA, 2008. ACM.
-
-
-
-
30
-
-
70350706400
-
-
M. Tungare and M. Pérez-Quinones. Thinking outside the (beige) box: Personal information management beyond the desktop. In Proceedings of the 3rd Invitational Workshop on Personal Information Management, page 8 pages, 2008.
-
M. Tungare and M. Pérez-Quinones. Thinking outside the (beige) box: Personal information management beyond the desktop. In Proceedings of the 3rd Invitational Workshop on Personal Information Management, page 8 pages, 2008.
-
-
-
-
31
-
-
85084161247
-
Why Johnny can't encrypt: A usability evaluation of PGP 5.0
-
A. Whitten and J. Tygar. Why Johnny can't encrypt: A usability evaluation of PGP 5.0. In The 9th USENIX Security Symposium, pages 169-183, 1999.
-
(1999)
The 9th USENIX Security Symposium
, pp. 169-183
-
-
Whitten, A.1
Tygar, J.2
-
32
-
-
70350722192
-
-
A. Whitten and J. Tygar. Safe staging for computer security. In the Workshop on Human-Computer Interaction and security Systems, page 4 pages, Ft. Lauderdale, FL, 2003.
-
A. Whitten and J. Tygar. Safe staging for computer security. In the Workshop on Human-Computer Interaction and security Systems, page 4 pages, Ft. Lauderdale, FL, 2003.
-
-
-
-
33
-
-
3042539179
-
The use and usability of direction based filtering in firewalls
-
A. Wool. The use and usability of direction based filtering in firewalls. Computers and Security, 37:459-468, 2004.
-
(2004)
Computers and Security
, vol.37
, pp. 459-468
-
-
Wool, A.1
-
35
-
-
12844271558
-
Aligning security and usability
-
Sept.-Oct
-
K.-P. Yee. Aligning security and usability. Security & Privacy, IEEE, 2(5):48-55, Sept.-Oct. 2004.
-
(2004)
Security & Privacy, IEEE
, vol.2
, Issue.5
, pp. 48-55
-
-
Yee, K.-P.1
|