메뉴 건너뛰기




Volumn , Issue , 2010, Pages 275-282

Security and usability: Analysis and evaluation

Author keywords

Evaluation; HCISec; Security; Threat model; Usability

Indexed keywords

ANALYSIS AND EVALUATION; EASE OF USE; EVALUATION; HCI METHODS; POTENTIAL THREATS; SECURE SYSTEM; SECURITY THREATS;

EID: 77952351869     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ARES.2010.77     Document Type: Conference Paper
Times cited : (96)

References (35)
  • 1
    • 12844271558 scopus 로고    scopus 로고
    • Aligning security and usability
    • K.-P. Yee, "Aligning Security and Usability," IEEE Security & Privacy, vol. 2, no. 5, pp. 48-55, 2004.
    • (2004) IEEE Security & Privacy , vol.2 , Issue.5 , pp. 48-55
    • Yee, K.-P.1
  • 3
    • 12844272841 scopus 로고    scopus 로고
    • In search of usable security: Five lessons from the field
    • D. Balfanz, G. Durfee, D. Smetters, and R. Grinter, "In search of usable security: five lessons from the field," IEEE Security & Privacy, vol. 2, no. 5, pp. 19-24, 2004.
    • (2004) IEEE Security & Privacy , vol.2 , Issue.5 , pp. 19-24
    • Balfanz, D.1    Durfee, G.2    Smetters, D.3    Grinter, R.4
  • 5
    • 85084161247 scopus 로고    scopus 로고
    • Why johnny can't encrypt: A usability evaluation of PGP 5.0
    • August Washington, 1999
    • A. Whitten and J. Tygar, "Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0," in Proceedings of the 8th USENIX Security Symposium, August 1999, Washington, 1999, pp. 169-183.
    • (1999) Proceedings of the 8th USENIX Security Symposium , pp. 169-183
    • Whitten, A.1    Tygar, J.2
  • 6
    • 0043232732 scopus 로고    scopus 로고
    • Users are not the enemy
    • A. Adams and M. A. Sasse, "Users are not the enemy," Commun. ACM, vol. 42, no. 12, pp. 40-46, 1999.
    • (1999) Commun. ACM , vol.42 , Issue.12 , pp. 40-46
    • Adams, A.1    Sasse, M.A.2
  • 7
    • 33745723917 scopus 로고    scopus 로고
    • Ph.D. dissertation, University of London [Online]. Available
    • A. Brostoff, "Improving password system effectiveness," Ph.D. dissertation, University of London, 2004. [Online]. Available: http://hornbeam.cs.ucl.ac.uk/hcs/publications/Brostoff- Improving%20Password%20System%20Effectiveness-Thesis%20final.pdf
    • (2004) Improving Password System Effectiveness
    • Brostoff, A.1
  • 8
    • 0003429117 scopus 로고    scopus 로고
    • Are passfaces more usable than passwords? A field trial investigation
    • [Online]. Available
    • S. Brostoff and M. A. Sasse, "Are Passfaces More Usable Than Passwords? A Field Trial Investigation," in Proceedings of HCI 2000, 2000. [Online]. Available: http://www.cs.ucl.ac.uk/staff/S.Brostoff/index\-files/ brostoff\-sasse\-hci2000.pdf
    • (2000) Proceedings of HCI 2000
    • Brostoff, S.1    Sasse, M.A.2
  • 16
    • 38549108892 scopus 로고    scopus 로고
    • Usability analysis of secure pairing methods
    • [Online]. Available
    • E. Uzun, K. Karvonen, and N. Asokan, "Usability Analysis of Secure Pairing Methods," in Financial Cryptography and Data Security, 2007, pp. 307-324. [Online]. Available: http://dx.doi.org/10.1007/978-3-540-77366-5-29
    • (2007) Financial Cryptography and Data Security , pp. 307-324
    • Uzun, E.1    Karvonen, K.2    Asokan, N.3
  • 17
    • 19944372231 scopus 로고    scopus 로고
    • Ph.D. dissertation, Carnegie Mellon University
    • A. Whitten, "Making Security Usable," Ph.D. dissertation, Carnegie Mellon University, 2004.
    • (2004) Making Security Usable
    • Whitten, A.1
  • 21
    • 34250012541 scopus 로고    scopus 로고
    • Red-eye blink, bendy shuffle, and the yuck factor: A user experience of biometric airport systems
    • M. A. Sasse, "Red-Eye Blink, Bendy Shuffle, and the Yuck Factor: A User Experience of Biometric Airport Systems," IEEE Security and Privacy, vol. 5, no. 3, pp. 78-81, 2007.
    • (2007) IEEE Security and Privacy , vol.5 , Issue.3 , pp. 78-81
    • Sasse, M.A.1
  • 23
    • 2342553334 scopus 로고    scopus 로고
    • "Ten strikes and you're out": Increasing the number of login attempts can improve password usability
    • John Wiley
    • S. Brostoff and M. A. Sasse, ""Ten strikes and you're out": Increasing the number of login attempts can improve password usability," in Proceedings of CHI 2003 Workshop on HCI and Security Systems. John Wiley, 2003.
    • (2003) Proceedings of CHI 2003 Workshop on HCI and Security Systems
    • Brostoff, S.1    Sasse, M.A.2
  • 26
    • 2342667933 scopus 로고    scopus 로고
    • Computer security: Anatomy of a usability disaster, and a plan for recovery
    • [Online]. Available
    • M. A. Sasse, "Computer Security: Anatomy of a Usability Disaster, and a Plan for Recovery," in Proceedings of CHI2003 Workshop on Human-Computer Interaction and Security Systems, 2003. [Online]. Available: http://www.andrewpatrick.ca/CHI2003/HCISEC/hcisec-workshop-sasse.pdf
    • (2003) Proceedings of CHI2003 Workshop on Human-Computer Interaction and Security Systems
    • Sasse, M.A.1
  • 28
    • 19944369828 scopus 로고    scopus 로고
    • Mechanisms for increasing the usability of grid security
    • hCI research in privacy and security. [Online]. Available
    • B. Beckles, V. Welch, and J. Basney, "Mechanisms for increasing the usability of grid security," International Journal of Human-Computer Studies, vol. 63, no. 1-2, pp. 74-101, 2005, hCI research in privacy and security. [Online]. Available: http://www.sciencedirect.com/science/article/ B6WGR-4G94J0R-3/2/5091b0c39ca9b9e17034b62db0004969
    • (2005) International Journal of Human-Computer Studies , vol.63 , Issue.1-2 , pp. 74-101
    • Beckles, B.1    Welch, V.2    Basney, J.3
  • 29
    • 0035387175 scopus 로고    scopus 로고
    • Transforming the 'weakest link' - A human/computer interaction approach to usable and effective security
    • M. A. Sasse, S. Brostoff, and D. Weirich, "Transforming the 'weakest link' - a human/computer interaction approach to usable and effective security," BT Technology Journal, vol. 19, no. 3, pp. 122-131, 2001.
    • (2001) BT Technology Journal , vol.19 , Issue.3 , pp. 122-131
    • Sasse, M.A.1    Brostoff, S.2    Weirich, D.3
  • 31
    • 0344920920 scopus 로고
    • Psychometric evaluation of an after-scenario questionnaire for computer usability studies: The ASQ
    • J. R. Lewis, "Psychometric evaluation of an after-scenario questionnaire for computer usability studies: the ASQ," SIGCHI Bull., vol. 23, no. 1, pp. 78-81, 1991.
    • (1991) SIGCHI Bull. , vol.23 , Issue.1 , pp. 78-81
    • Lewis, J.R.1
  • 32
    • 61349092288 scopus 로고    scopus 로고
    • Studying users' computer security behavior: A health belief perspective
    • iT Decisions in Organizations. [Online]. Available
    • B.-Y. Ng, A. Kankanhalli, and Y. C. Xu, "Studying Users' Computer Security Behavior: A Health Belief Perspective," Decision Support Systems, vol. 46, no. 4, pp. 815-825, 2009, iT Decisions in Organizations. [Online]. Available: http://www.sciencedirect.com/science/article/B6V8S-4TYYMNV-3/2/ 842f546339406093d3e1fb6c28e5ef71
    • (2009) Decision Support Systems , vol.46 , Issue.4 , pp. 815-825
    • Ng, B.-Y.1    Kankanhalli, A.2    Xu, Y.C.3
  • 34
    • 0030283177 scopus 로고    scopus 로고
    • Scenario-based analysis of software architecture
    • R. Kazman, G. Abowd, L. Bass, and P. Clements, "Scenario-Based Analysis of Software Architecture," IEEE Softw., vol. 13, no. 6, pp. 47-55, 1996.
    • (1996) IEEE Softw. , vol.13 , Issue.6 , pp. 47-55
    • Kazman, R.1    Abowd, G.2    Bass, L.3    Clements, P.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.