메뉴 건너뛰기




Volumn , Issue , 2008, Pages 402-414

Human factors in information security and privacy

Author keywords

[No Author keywords available]

Indexed keywords


EID: 77952945989     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.4018/978-1-59904-855-0.ch035     Document Type: Chapter
Times cited : (9)

References (23)
  • 1
    • 84883892066 scopus 로고    scopus 로고
    • Privacy in e-commerce: Examining user scenarios and privacy preferences
    • New York: ACM
    • Ackerman, M. S., Cranor, L. F., & Reagle, J. (1999). Privacy in E-commerce: Examining user scenarios and privacy preferences. E-commerce 99 (pp. 1-8). New York: ACM.
    • (1999) E-commerce , vol.99 , pp. 1-8
    • Ackerman, M.S.1    Cranor, L.F.2    Reagle, J.3
  • 5
    • 84898159596 scopus 로고    scopus 로고
    • CNNMoney.com, Retrieved on November 12, 2006 from
    • CNNMoney.com (2005). ChoicePoint: More ID theft warnings. Retrieved on November 12, 2006 from http://money.cnn.com/2005/02/17/technology/person-altech/choicepoint/
    • (2005) ChoicePoint: More ID Theft Warnings
  • 6
    • 0038684367 scopus 로고    scopus 로고
    • Sebastopol, CA: O'Reilly Media, Inc
    • Cranor, L. F. (2002). Web privacy with P3P. Sebastopol, CA: O'Reilly Media, Inc.
    • (2002) Web Privacy with P3P
    • Cranor, L.F.1
  • 9
    • 38149134412 scopus 로고    scopus 로고
    • Reconciling privacy policies and regulations: Ontological semantics perspective
    • In M. J. Smith & G. Salvendy (Eds.), Berlin: Springer-Verlag
    • Krachina, O., Raskin, V., & Triezenberg, K. E. (2007). Reconciling privacy policies and regulations: Ontological semantics perspective. In M. J. Smith & G. Salvendy (Eds.), Human Interface, Part II, HCII 2007, Lecture Notes in Computer Science 4558 (pp. 730-739). Berlin: Springer-Verlag.
    • (2007) Human Interface, Part II, HCII 2007, Lecture Notes in Computer Science , vol.4558 , pp. 730-739
    • Krachina, O.1    Raskin, V.2    Triezenberg, K.E.3
  • 10
    • 84898085076 scopus 로고    scopus 로고
    • SecurityFocus 2006-05-22, Retrieved November 12, 2006 from
    • Lemos, R. (2006). Veterans Affairs warns of massive privacy breach. SecurityFocus 2006-05-22. Retrieved November 12, 2006 from http://www.securityfocus.com/news/11393
    • (2006) Veterans Affairs Warns of Massive Privacy Breach
    • Lemos, R.1
  • 11
    • 29844455709 scopus 로고    scopus 로고
    • Do privacy seals in e-commerce really work?
    • Moores, T. T., & Dhillon, G. (2003). Do privacy seals in e-commerce really work? Communications of the ACM, 46(12), 265-271.
    • (2003) Communications of the ACM , vol.46 , Issue.12 , pp. 265-271
    • Moores, T.T.1    Dhillon, G.2
  • 12
    • 84898193113 scopus 로고    scopus 로고
    • 140 kaiser patients' private data put online
    • Retrieved November 12, 2006 from
    • Ostrov, B. F. (2005). 140 Kaiser patients' private data put online. Mercury News, March 11. Retrieved November 12, 2006 from http://lists.jammed.com/ISN/2005/03/0062.html
    • (2005) Mercury News, March 11
    • Ostrov, B.F.1
  • 15
    • 84898381493 scopus 로고    scopus 로고
    • Human factors and ergonomics for the internet
    • In H. Bidgoli (Ed.), Hoboken, NJ: John Wiley
    • Proctor, R. W., & Vu, K.-P. L. (2004). Human factors and ergonomics for the Internet. In H. Bidgoli (Ed.), The Internet encyclopedia (Vol. 2, pp. 141-149). Hoboken, NJ: John Wiley.
    • (2004) The Internet Encyclopedia , vol.2 , pp. 141-149
    • Proctor, R.W.1    Vu, K.-P.L.2
  • 16
    • 38149094028 scopus 로고    scopus 로고
    • Usability of user agents for privacy-preference specification
    • In M. J. Smith & G. Salvendy (Eds.), Berlin: Springer-Verlag
    • Proctor, R. W., Vu, K.-P. L., & Ali, M. A. (2007). Usability of user agents for privacy-preference specification. In M. J. Smith & G. Salvendy (Eds.) Human Interface, Part II, HCII 2007, Lecture Notes in Computer Science 4558 (pp. 766-767). Berlin: Springer-Verlag.
    • (2007) Human Interface, Part II, HCII 2007, Lecture Notes in Computer Science , vol.4558 , pp. 766-767
    • Proctor, R.W.1    Vu, K.-P.L.2    Ali, M.A.3
  • 17
    • 84898147004 scopus 로고    scopus 로고
    • The future - Human factors and emerging internet business models
    • In, Santa Monica, CA: Human Factors and Ergonomics Society
    • Resnick, M. (2006). The future - Human factors and emerging Internet business models. In Proceedings of the Human Factors and Ergonomics Society 50th Annual Meeting (pp. 1445-1446). Santa Monica, CA: Human Factors and Ergonomics Society.
    • (2006) Proceedings of the Human Factors and Ergonomics Society 50th Annual Meeting , pp. 1445-1446
    • Resnick, M.1
  • 18
    • 84898184851 scopus 로고    scopus 로고
    • Consumer data stolen from seisint databases
    • SANS, March 16
    • SANS (2005a). Consumer data stolen from Seisint databases. SANS NewsBites, 7(11), March 16.
    • (2005) SANS NewsBites , vol.7 , Issue.11
  • 19
    • 84898383746 scopus 로고    scopus 로고
    • Dutch police arrest three in bot scheme
    • SANS, October 11
    • SANS (2005b). Dutch police arrest three in Bot scheme. SANS NewsBites, 7(43), October 11.
    • (2005) SANS NewsBites , vol.7 , Issue.43
  • 20
    • 84898222125 scopus 로고    scopus 로고
    • Iis web servers: It's time to just be careful
    • Schultz, E.E. (2001). IIS Web servers: It's time to just be careful. Information Security Bulletin, 6(9), 17-22.
    • (2001) Information Security Bulletin , vol.6 , Issue.9 , pp. 17-22
    • Schultz, E.E.1
  • 21
    • 34249690691 scopus 로고    scopus 로고
    • Web security and privacy
    • In R. W. Proctor & K.-P. L. Vu (Eds.), Mahwah, NJ: Lawrence Erlbaum Associates
    • Schultz, E.E. (2005). Web security and privacy. In R. W. Proctor & K.-P. L. Vu (Eds.), Handbook of human factors in Web design (pp. 613-625). Mahwah, NJ: Lawrence Erlbaum Associates.
    • (2005) Handbook of Human Factors in Web Design , pp. 613-625
    • Schultz, E.E.1
  • 22
    • 84967376684 scopus 로고    scopus 로고
    • Solutions to many of our security problems already exist, so why are we still so vulner-able?
    • June
    • Viega, J. (2005). Solutions to many of our security problems already exist, so why are we still so vulner-able? Queue, June, 40-50.
    • (2005) Queue , pp. 40-50
    • Viega, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.