-
1
-
-
0003513422
-
-
2nd Edition. Morgan Kaufmann Publishers, Inc
-
R. M. Baecker, J. Grudin, W. Buxton, and S. Greenberg. Readings in Human-Computer Interaction: Toward the Year 2000, 2nd Edition. Morgan Kaufmann Publishers, Inc, 1995.
-
(1995)
Readings in Human-Computer Interaction: Toward the Year 2000
-
-
Baecker, R.M.1
Grudin, J.2
Buxton, W.3
Greenberg, S.4
-
2
-
-
0001888414
-
Helping people find what they don't know
-
August
-
N. J. Belkin. Helping people find what they don't know. Communications of the ACM, 43(8), August 2000.
-
(2000)
Communications of the ACM
, vol.43
, Issue.8
-
-
Belkin, N.J.1
-
10
-
-
1842863099
-
Using security: Easier said than done
-
April 2004
-
S. M. Furnell. Using security: easier said than done. Computer Fraud & Security, 2004(4):6-10, April 2004.
-
(2004)
Computer Fraud & Security
, Issue.4
, pp. 6-10
-
-
Furnell, S.M.1
-
11
-
-
19944387279
-
Why users cannot use security
-
June
-
S. M. Furnell. Why users cannot use security. Computers & Security, 24(4):274-279, June 2005.
-
(2005)
Computers & Security
, vol.24
, Issue.4
, pp. 274-279
-
-
Furnell, S.M.1
-
12
-
-
32444433117
-
The challenges of understanding and using security: A survey of end users
-
S. M. Furnell, A. Jusoh, and D. Katsabas. The challenges of understanding and using security: A survey of end users. Computers & Security, 25:27-35, 2006.
-
(2006)
Computers & Security
, vol.25
, pp. 27-35
-
-
Furnell, S.M.1
Jusoh, A.2
Katsabas, D.3
-
16
-
-
57249096290
-
Edit wear and read wear
-
ACM Press, May
-
W. C. Hill, J. D. Hollan, D. Wroblewski, and T. McCandless. Edit wear and read wear. In Proceedings of the Conference on Human Factors in Computing Systems (CHI'92), pages 3-9. ACM Press, May 1992.
-
(1992)
Proceedings of the Conference on Human Factors in Computing Systems (CHI'92)
, pp. 3-9
-
-
Hill, W.C.1
Hollan, J.D.2
Wroblewski, D.3
McCandless, T.4
-
19
-
-
18944390314
-
Little machines: Understanding users understanding interfaces
-
November
-
J. Johnson-Eilola. Little machines: understanding users understanding interfaces. ACM Journal of Computer Documentation, 25(4):119-127, November 2001.
-
(2001)
ACM Journal of Computer Documentation
, vol.25
, Issue.4
, pp. 119-127
-
-
Johnson-Eilola, J.1
-
20
-
-
0347025921
-
Security and human computer interfaces
-
December
-
J. Johnston, J. H. P. Eloff, and L. Labuschagne. Security and human computer interfaces. Computers & Security, 22(8):675-684, December 2003.
-
(2003)
Computers & Security
, vol.22
, Issue.8
, pp. 675-684
-
-
Johnston, J.1
Eloff, J.H.P.2
Labuschagne, L.3
-
24
-
-
19944391032
-
Improving user-interface dependability through mitigation of human error
-
July
-
R. A. Maxion and R. W. Reeder. Improving user-interface dependability through mitigation of human error. International Journal of Human-Computer Studies, 63(1-2):25-50, July 2005.
-
(2005)
International Journal of Human-Computer Studies
, vol.63
, Issue.1-2
, pp. 25-50
-
-
Maxion, R.A.1
Reeder, R.W.2
-
27
-
-
0004284157
-
-
J. Nielsen and R. L. Mack, editors Wiley & Sons
-
J. Nielsen and R. L. Mack, editors. Usability Inspection Methods. Wiley & Sons, 1994.
-
(1994)
Usability Inspection Methods
-
-
-
29
-
-
0035387175
-
Transforming the weakest link - A human/computer interaction approach to usable and effective security
-
July
-
M. A. Sasse, S. Brostoff, and D. Weirich. Transforming the weakest link - a human/computer interaction approach to usable and effective security. BT Technology Journal, 19(3):122-131, July 2003.
-
(2003)
BT Technology Journal
, vol.19
, Issue.3
, pp. 122-131
-
-
Sasse, M.A.1
Brostoff, S.2
Weirich, D.3
-
31
-
-
35048814469
-
A framework for evaluating the usability and the utility of PKI-enabled applications
-
S. K. Katsikas, S. Gritzalis, and J. Lopez, editors Proceedings of the European PKI Workshop: Research and Applications (EuroPKI'04) Springer-Verlag, June
-
T. Straub and H. Baier. A framework for evaluating the usability and the utility of PKI-enabled applications. In S. K. Katsikas, S. Gritzalis, and J. Lopez, editors, Proceedings of the European PKI Workshop: Research and Applications (EuroPKI'04), LNCS 3093, pages 112-125. Springer-Verlag, June 2004.
-
(2004)
LNCS
, vol.3093
, pp. 112-125
-
-
Straub, T.1
Baier, H.2
-
35
-
-
19944372231
-
-
PhD thesis. School of Computer Science, Carnegie Mellon University, May CMU-CS-04-135
-
A. Whitten. Making Security Usable. PhD thesis. School of Computer Science, Carnegie Mellon University, May 2004. CMU-CS-04-135.
-
(2004)
Making Security Usable
-
-
Whitten, A.1
-
38
-
-
3042539179
-
The use and usability of direction-based filtering in firewalls
-
September
-
A. Wool. The use and usability of direction-based filtering in firewalls. Computers & Security. 23(6):459-468, September 2004.
-
(2004)
Computers & Security
, vol.23
, Issue.6
, pp. 459-468
-
-
Wool, A.1
|