-
1
-
-
0043232732
-
Users Are Not the Enemy
-
December
-
Adams, A. and Sasse, M.A. Users Are Not The Enemy. Communications of the ACM 42, 12 (December 1999), 41-46.
-
(1999)
Communications of the ACM
, vol.42
, Issue.12
, pp. 41-46
-
-
Adams, A.1
Sasse, M.A.2
-
3
-
-
77950564668
-
The Compliance Budget: Managing Security Behaviour in Organisations
-
ACM Press
-
Beautement, A., Sasse, M.A., and Wonham, M. The Compliance Budget: Managing Security Behaviour in Organisations. In Proc. NSPW 2008, ACM Press (2009), 47-58.
-
(2009)
Proc. NSPW 2008
, pp. 47-58
-
-
Beautement, A.1
Sasse, M.A.2
Wonham, M.3
-
4
-
-
0242708756
-
Safe and Sound: A Safety-Critical Approach to Security
-
Brostoff, S. and Sasse, M.A. Safe and Sound: A Safety- Critical Approach to Security. In Proc. NSPW 2001 (2001), 41-50.
-
Proc. NSPW 2001 (2001)
, pp. 41-50
-
-
Brostoff, S.1
Sasse, M.A.2
-
5
-
-
0033689778
-
A Diary Study of Information Capture in Working Life
-
ACM Press
-
Brown, B.A.T., Sellen, A.J., and O'Hara, K.P. A Diary Study of Information Capture in Working Life. In Proc. CHI 2000, ACM Press (2000), 438-445.
-
(2000)
Proc. CHI 2000
, pp. 438-445
-
-
Brown, B.A.T.1
Sellen, A.J.2
O'Hara, K.P.3
-
7
-
-
84900482702
-
Security in the wild: User strategies for managing security as an everyday, practical problem
-
Dourish, P., Grinter, R.E., Delgado de la Flor, J., and Joseph, M. Security in the wild: user strategies for managing security as an everyday, practical problem. Personal and Ubiquitous Computing 8, 6 (2004), 391-401.
-
(2004)
Personal and Ubiquitous Computing
, vol.8
, Issue.6
, pp. 391-401
-
-
Dourish, P.1
Grinter, R.E.2
Delgado De La Flor, J.3
Joseph, M.4
-
10
-
-
35348884906
-
Large-Scale Study of Web Password Habits
-
ACM Press
-
Florêncio, D. and Herley, C.A. Large-Scale Study of Web Password Habits. In Proc. WWW 2007, ACM Press (2007), 657-666.
-
(2007)
Proc. WWW 2007
, pp. 657-666
-
-
Florêncio, D.1
Herley, C.A.2
-
11
-
-
85044211678
-
Do Strong Web Passwords Accomplish Anything?
-
USENIX Association Article No. 10
-
Florêncio, D., Herley, C., and Coskun, B. Do Strong Web Passwords Accomplish Anything? In Proc. HotSec 07, USENIX Association (2007), Article No. 10.
-
(2007)
Proc. HotSec 07
-
-
Florêncio, D.1
Herley, C.2
Coskun, B.3
-
12
-
-
77950877250
-
So Long and No Thanks for the Externalities: The Rational Rejection of Security Advice by Users
-
Herley, C. So Long and No Thanks for the Externalities: The Rational Rejection of Security Advice by Users. In NSPW 2009.
-
NSPW 2009
-
-
Herley, C.1
-
13
-
-
0018543411
-
PASSWORD SECURITY: A CASE HISTORY
-
DOI 10.1145/359168.359172
-
Morris, R. and Thompson, K. Password security: a case history. Communications of the ACM 22, 11 (November 1979), 594-597. (Pubitemid 10431335)
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 594-597
-
-
Morris, R.1
Thompson, K.2
-
15
-
-
0037661108
-
Voice-Mail Diary Studies for Naturalistic Data Capture under Mobile Conditions
-
ACM Press
-
Palen, L. and Salzman, M. Voice-Mail Diary Studies for Naturalistic Data Capture under Mobile Conditions. In Proc. CSCW 2002, ACM Press (2002), 87-95.
-
(2002)
Proc. CSCW 2002
, pp. 87-95
-
-
Palen, L.1
Salzman, M.2
-
16
-
-
0035387175
-
Transforming the 'weakest link' - A human/computer interaction approach to usable and effective security
-
DOI 10.1023/A:1011902718709
-
Sasse, M.A., Brostoff, S., and Weirich, D. Transforming the 'weakest link' - a human/computer interaction approach to usable and effective security. BT Technology Journal 19, 3 (July 2001), 122-131. (Pubitemid 32903117)
-
(2001)
BT Technology Journal
, vol.19
, Issue.3
, pp. 122-131
-
-
Sasse, M.A.1
Brostoff, S.2
Weirich, D.3
-
20
-
-
35348928239
-
Password Sharing: Implications for Security Design Based on Social Practice
-
ACM Press
-
Singh, S., Cabraal, A., Demosthenous, C., Astbrink, G., and Furlong, M. Password Sharing: Implications for Security Design Based on Social Practice. In Proc. CHI 2007, ACM Press (2007), 895-904.
-
(2007)
Proc. CHI 2007
, pp. 895-904
-
-
Singh, S.1
Cabraal, A.2
Demosthenous, C.3
Astbrink, G.4
Furlong, M.5
-
21
-
-
77953999893
-
-
Trust Economics. http://www.trust-economics.org/.
-
-
-
-
22
-
-
12844275960
-
Password Memorability and Security: Empirical Results
-
September/October
-
Yan, J., Blackwell, A., Anderson, R., and Grant, A. Password Memorability and Security: Empirical Results. IEEE Security & Privacy 2, 5 (September/October 2004), 25-31.
-
(2004)
IEEE Security & Privacy
, vol.2
, Issue.5
, pp. 25-31
-
-
Yan, J.1
Blackwell, A.2
Anderson, R.3
Grant, A.4
|