-
1
-
-
0043232732
-
Users are not the enemy: Why users compromise computer security mechanisms and how to take remedial measures
-
Adams, A. and Sasse, M.A. (1999) 'Users are not the enemy: why users compromise computer security mechanisms and how to take remedial measures', Communications of the ACM, Vol. 42, pp.41-46.
-
(1999)
Communications of the ACM
, vol.42
, pp. 41-46
-
-
Adams, A.1
Sasse, M.A.2
-
2
-
-
12844272841
-
In search of usable security: Five lessons from the field
-
Balfanz, D., Durfee, G., Grinter, R. and Smetters, D.K. (2004) 'In search of usable security: five lessons from the field', IEEE Privacy and Security, Vol. 2(5), pp.19-24.
-
(2004)
IEEE Privacy and Security
, vol.2
, Issue.5
, pp. 19-24
-
-
Balfanz, D.1
Durfee, G.2
Grinter, R.3
Smetters, D.K.4
-
3
-
-
34547269590
-
Psychological acceptability revisited
-
L.F. Cranor and S. Garfinkel (Eds), Sebastopol, CA: O' Reilly Media, Inc
-
Bishop, M. (2005) 'Psychological acceptability revisited', in L.F. Cranor and S. Garfinkel (Eds), Security and Usability: Designing Secure Systems that People can Use (pp.1-11). Sebastopol, CA: O' Reilly Media, Inc.
-
(2005)
Security and Usability: Designing Secure Systems That People Can Use
, pp. 1-11
-
-
Bishop, M.1
-
5
-
-
67249157694
-
Examining the impact of organisational and owner's characteristics on the extent of e-commerce adoption in SMEs
-
Chuang, T., Nakatani, K., Chen, J. and Huang, I. (2007) 'Examining the impact of organisational and owner's characteristics on the extent of e-commerce adoption in SMEs', Int. J. Business and Systems Research, Vol. 1, pp.61-80.
-
(2007)
Int. J. Business and Systems Research
, vol.1
, pp. 61-80
-
-
Chuang, T.1
Nakatani, K.2
Chen, J.3
Huang, I.4
-
6
-
-
0038649499
-
-
Computer Science and Telecommunications Board, Washington, DC: National Academy Press
-
Computer Science and Telecommunications Board (2002) IDs-Not That Easy: Questions about Nationwide Identity Systems. Washington, DC: National Academy Press.
-
(2002)
IDs-Not That Easy: Questions about Nationwide Identity Systems
-
-
-
9
-
-
85084162383
-
On user choice in graphical password schemes
-
Davis, D., Monrose, F. and Reiter, M. (2004) 'On user choice in graphical password schemes', Paper presented at the 13th Usenix Security Symposium, San Diego, CA.
-
(2004)
Paper Presented at the 13th Usenix Security Symposium, San Diego, CA
-
-
Davis, D.1
Monrose, F.2
Reiter, M.3
-
10
-
-
19944372131
-
Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems
-
De Angeli, A., Coventry, L., Johnson, G. and Renaud, K. (2005) 'Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems', Int. J. Human-Computer Studies, Vol. 63, pp.128-152.
-
(2005)
Int. J. Human-Computer Studies
, vol.63
, pp. 128-152
-
-
De Angeli, A.1
Coventry, L.2
Johnson, G.3
Renaud, K.4
-
12
-
-
85084161493
-
Deja Vu: A user study. Using images for authentication
-
Dhamija, R. and Perrig, A. (2000) 'Deja Vu: a user study. Using images for authentication', Paper presented at the 9th USENIX Security Symposium.
-
(2000)
9th USENIX Security Symposium
-
-
Dhamija, R.1
Perrig, A.2
-
14
-
-
32444433117
-
The challenges of understanding and using security: A survey of end-users
-
Furnell, S.M., Jusoh, A. and Katsabas, D. (2006) 'The challenges of understanding and using security: a survey of end-users', Computers and Security, Vol. 25, pp.27-35.
-
(2006)
Computers and Security
, vol.25
, pp. 27-35
-
-
Furnell, S.M.1
Jusoh, A.2
Katsabas, D.3
-
16
-
-
34248376106
-
Increasing security and usability of computer systems with graphical passwords
-
March 23-27, Winston-Salem, North Carolina, USA
-
Hinds, C. and Ekwueme, C. (2007) 'Increasing security and usability of computer systems with graphical passwords', Proceedings of the 45th ACM Southeast Regional Conference 2007, March 23-27, Winston-Salem, North Carolina, USA, pp.529-530.
-
(2007)
Proceedings of the 45th ACM Southeast Regional Conference 2007
, pp. 529-530
-
-
Hinds, C.1
Ekwueme, C.2
-
17
-
-
4243096135
-
The domino effect of password reuse
-
Ives, B., Walsh, K.R. and Schneider, H. (2004) 'The domino effect of password reuse', Communications of the ACM, Vol. 47, pp.75-78.
-
(2004)
Communications of the ACM
, vol.47
, pp. 75-78
-
-
Ives, B.1
Walsh, K.R.2
Schneider, H.3
-
18
-
-
85084161999
-
The design and analysis of graphical passwords
-
Jermyn, I., Mayer, A., Monrose, F., Reiter, M. and Rubin, A. (1999) 'The design and analysis of graphical passwords', Paper presented at the 8th USENIX Security Symposium, Washington, DC.
-
(1999)
8th USENIX Security Symposium, Washington, DC
-
-
Jermyn, I.1
Mayer, A.2
Monrose, F.3
Reiter, M.4
Rubin, A.5
-
19
-
-
33751168960
-
The usability of passphrases for authentication: An empirical field study
-
Keith, M., Shao, B. and Steinbart, P.J. (2007) 'The usability of passphrases for authentication: an empirical field study', Int. J. Human-Computer Studies, Vol. 65, pp.17-28.
-
(2007)
Int. J. Human-Computer Studies
, vol.65
, pp. 17-28
-
-
Keith, M.1
Shao, B.2
Steinbart, P.J.3
-
20
-
-
0031191681
-
A proposed index of usability: A method for comparing the relative usability of different software systems
-
Lin, H.X., Choong, Y.Y. and Salvendy, G. (1997) 'A proposed index of usability: a method for comparing the relative usability of different software systems', Behaviour and Information Technology, Vol. 16, pp.267-277.
-
(1997)
Behaviour and Information Technology
, vol.16
, pp. 267-277
-
-
Lin, H.X.1
Choong, Y.Y.2
Salvendy, G.3
-
21
-
-
0030234484
-
An attributional explanation of individual resistance to the introduction of information technologies in the workplace
-
Martrinko, M.J., Henry, J.W. and Zmud, R.W. (1996) 'An attributional explanation of individual resistance to the introduction of information technologies in the workplace', Behavior and Information Technology, Vol. 15, pp.313-330.
-
(1996)
Behavior and Information Technology
, vol.15
, pp. 313-330
-
-
Martrinko, M.J.1
Henry, J.W.2
Zmud, R.W.3
-
22
-
-
0002531755
-
Job and team design
-
G. Salvendy (Ed.), 2nd ed. New York: John Wiley and Sons, Inc
-
Medsker, G.L. and Campion, M.A. (1997) 'Job and team design', in G. Salvendy (Ed.), Handbook of Human Factors and Engineering, 2nd ed. (pp.450-489). New York: John Wiley and Sons, Inc.
-
(1997)
Handbook of Human Factors and Engineering
, pp. 450-489
-
-
Medsker, G.L.1
Campion, M.A.2
-
23
-
-
84936893490
-
Vital signs of identity
-
Millar, B. (1994) 'Vital signs of identity', IEEE Spectrum, Vol. 31, pp.22-28.
-
(1994)
IEEE Spectrum
, vol.31
, pp. 22-28
-
-
Millar, B.1
-
24
-
-
39749093168
-
The magical number seven, plus or minus two: Some limits on our capacity for processing information
-
Miller, G.A. (1956) 'The magical number seven, plus or minus two: some limits on our capacity for processing information', The Psychological Review, Vol. 63, pp.81-97.
-
(1956)
The Psychological Review
, vol.63
, pp. 81-97
-
-
Miller, G.A.1
-
25
-
-
35348895703
-
Pictures at the ATM: Exploring the usability of multiple graphical passwords
-
Moncur, W. and Leplatre, G. (2007) 'Pictures at the ATM: exploring the usability of multiple graphical passwords', Proceedings of CHI 2007 Conference on Human Factors in Computing Systems, April 28-May 3, San Jose, California, pp.887-894.
-
(2007)
Proceedings of CHI 2007 Conference on Human Factors in Computing Systems, April 28-May 3, San Jose, California
, pp. 887-894
-
-
Moncur, W.1
Leplatre, G.2
-
27
-
-
77952176209
-
Performance measurement implementation in a knowledge-based public organisation
-
Rantanen, H., Leva, K. and Pekkola, S. (2007) 'Performance measurement implementation in a knowledge-based public organisation', Int. J. Business and Systems Research, Vol. 1, pp.343-353.
-
(2007)
Int. J. Business and Systems Research
, vol.1
, pp. 343-353
-
-
Rantanen, H.1
Leva, K.2
Pekkola, S.3
-
28
-
-
85010216246
-
-
retrieved 18 February 2005
-
Real User Corporation. (2005) 'How the Passface™ system works', retrieved 18 February 2005 from: http://www/realuser.com/technology/about- passfaces.htm
-
(2005)
How the Passface™ System Works
-
-
-
29
-
-
0016555241
-
The protection of information in computer systems
-
Saltzer, J.H. and Schroeder, M.D. (1975) 'The protection of information in computer systems', Proceedings of the IEEE, Vol. 63, pp.1278-1308.
-
(1975)
Proceedings of the IEEE
, vol.63
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
30
-
-
0035387175
-
Transforming the 'weakest link'-a human/computer interaction approach to usable and effective security
-
Sasse, M.A., Brostoff, S. and Weirich, D. (2001) 'Transforming the 'weakest link'-a human/computer interaction approach to usable and effective security', BT Technology Journal, Vol. 19, pp.122-131.
-
(2001)
BT Technology Journal
, vol.19
, pp. 122-131
-
-
Sasse, M.A.1
Brostoff, S.2
Weirich, D.3
-
31
-
-
34347333511
-
Research on usability in information security
-
Schultz, E.E. (2007) 'Research on usability in information security', Computer Fraud and Security, Vol. 6, pp.8-10.
-
(2007)
Computer Fraud and Security
, vol.6
, pp. 8-10
-
-
Schultz, E.E.1
-
32
-
-
0035149763
-
Usability and security: An appraisal of usability issues in information security methods
-
Schultz, E.E., Proctor, R.W., Lien, M.-C. and Salvendy, G. (2001) 'Usability and security: an appraisal of usability issues in information security methods', Computers and Security, Vol. 20, pp.620-634.
-
(2001)
Computers and Security
, vol.20
, pp. 620-634
-
-
Schultz, E.E.1
Proctor, R.W.2
Lien, M.-C.3
Salvendy, G.4
-
33
-
-
0000568988
-
Development and validation of the purdue cognitive job analysis methodology
-
Wei, J. and Salvendy, G. (2001) 'Development and validation of the purdue cognitive job analysis methodology', Int. J. Cognitive Ergonomics, Vol. 4, pp.277-296.
-
(2001)
Int. J. Cognitive Ergonomics
, vol.4
, pp. 277-296
-
-
Wei, J.1
Salvendy, G.2
-
34
-
-
19944375977
-
Passwords you'll never forget, but can't recall
-
Weinshall, D. and Kirkpatrick, S. (2004) 'Passwords you'll never forget, but can't recall', Paper presented at the ACM Conference on Computer Human Interaction (CHI), Vienna, Austria, April 24-29.
-
(2004)
ACM Conference on Computer Human Interaction (CHI), Vienna, Austria, April 24-29
-
-
Weinshall, D.1
Kirkpatrick, S.2
-
38
-
-
12844275960
-
Password memorability and security: Empirical results
-
Yan, J., Blackwell, A., Anderson, R. and Grant, A. (2004) 'Password memorability and security: empirical results', IEEE Privacy and Security, Vol. 2, pp.25-31.
-
(2004)
IEEE Privacy and Security
, vol.2
, pp. 25-31
-
-
Yan, J.1
Blackwell, A.2
Anderson, R.3
Grant, A.4
-
39
-
-
27944510130
-
Perceived security factors in e-commerce among Turkish university students
-
Yenisey, M.M., Ozok, A.A. and Salvendy, G. (2005) 'Perceived security factors in e-commerce among Turkish university students', Behaviour and Information Technology, Vol. 24, pp.259-274.
-
(2005)
Behaviour and Information Technology
, vol.24
, pp. 259-274
-
-
Yenisey, M.M.1
Ozok, A.A.2
Salvendy, G.3
|