-
1
-
-
77955337124
-
Data retention and anonymity services
-
V. Matyas et al., editor, Boston, Springer
-
S. Berthold, R. Böhme, and S. Köpsell. Data retention and anonymity services. In V. Matyas et al., editor, The Future of Identity in the Information Socienty, pages 92-106, Boston, 2009. Springer.
-
(2009)
The Future of Identity in the Information Socienty
, pp. 92-106
-
-
Berthold, S.1
Böhme, R.2
Köpsell, S.3
-
3
-
-
33745816410
-
Why phishing works
-
Montréal, Canada, ACM
-
R. Dhamija, J. D. Tygar, and M. Hearst. Why phishing works. In Proc. of CHI, pages 581-590, Montréal, Canada, 2006. ACM.
-
(2006)
Proc. of CHI
, pp. 581-590
-
-
Dhamija, R.1
Tygar, J.D.2
Hearst, M.3
-
4
-
-
57649166927
-
You've been warned: An empirical study of the effectiveness of web browser phishing warnings
-
Florence, Italy
-
S. Egelman, L. F. Cranor, and J. I. Hong. You've been warned: an empirical study of the effectiveness of web browser phishing warnings. In Proc. of CHI, pages 1065-1074, Florence, Italy, 2008.
-
(2008)
Proc. of CHI
, pp. 1065-1074
-
-
Egelman, S.1
Cranor, L.F.2
Hong, J.I.3
-
5
-
-
33750310718
-
Informed consent by design
-
S. Garfinkel and L. F. Cranor, editors, O'Reilly
-
B. Friedman, P. Lin, and J. K. Miller. Informed consent by design. In S. Garfinkel and L. F. Cranor, editors, Security and Usability: Designing Secure Systems that People Can Use, pages 495-522. O'Reilly, 2005.
-
(2005)
Security and Usability: Designing Secure Systems That People Can Use
, pp. 495-522
-
-
Friedman, B.1
Lin, P.2
Miller, J.K.3
-
6
-
-
35348905154
-
Noticing notice: A large-scale experiment on the timing of software license agreements
-
San Jose, CA
-
N. Good, J. Grossklags, D. K. Mulligan, and J. A. Konstan. Noticing notice: a large-scale experiment on the timing of software license agreements. In Proc. of CHI, pages 607-616, San Jose, CA, 2007.
-
(2007)
Proc. of CHI
, pp. 607-616
-
-
Good, N.1
Grossklags, J.2
Mulligan, D.K.3
Konstan, J.A.4
-
7
-
-
38549085605
-
Empirical studies on software notices to inform policy makers and usability designers
-
Financial Cryptography, Springer
-
J. Grossklags and N. Good. Empirical studies on software notices to inform policy makers and usability designers. In Financial Cryptography, LNCS 4886, pages 341-355. Springer, 2007.
-
(2007)
LNCS
, vol.4886
, pp. 341-355
-
-
Grossklags, J.1
Good, N.2
-
8
-
-
33845802129
-
Understanding the decision to participate in a survey
-
R. M. Groves, R. B. Cialdini, and M. P. Couper. Understanding the decision to participate in a survey. Public Opinion Quarterly, 56(4):475-495, 1992.
-
(1992)
Public Opinion Quarterly
, vol.56
, Issue.4
, pp. 475-495
-
-
Groves, R.M.1
Cialdini, R.B.2
Couper, M.P.3
-
9
-
-
0040000076
-
On implementing the door-in-the-face compliance technique in a business context
-
J. C. Mowen and R. B. Cialdini. On implementing the door-in-the-face compliance technique in a business context. Journal of Marketing Research, 17:453-458, 1980.
-
(1980)
Journal of Marketing Research
, vol.17
, pp. 453-458
-
-
Mowen, J.C.1
Cialdini, R.B.2
-
10
-
-
0001957492
-
An individual differences perspective on assessing cognitive processes
-
N. Schwarz and S. Sudman, editors, Jossey-Bass
-
R. E. Petty and W. B. G. Jarvis. An individual differences perspective on assessing cognitive processes. In N. Schwarz and S. Sudman, editors, Answering Questions, pages 221-257. Jossey-Bass, 1996.
-
(1996)
Answering Questions
, pp. 221-257
-
-
Petty, R.E.1
Jarvis, W.B.G.2
-
12
-
-
84926351578
-
Crying wolf: An empirical study of SSL warning effectiveness
-
J. Sunshine, S. Egelman, H. Almuhimedi, N. Atri, and L. F. Cranor. Crying wolf: An empirical study of SSL warning effectiveness. In Proc. of the 18th USENIX Security Symposium, 2009.
-
Proc. of the 18th USENIX Security Symposium, 2009
-
-
Sunshine, J.1
Egelman, S.2
Almuhimedi, H.3
Atri, N.4
Cranor, L.F.5
-
14
-
-
14744272698
-
Why we can't be bothered to read privacy policies
-
L. J. Camp and S. Lewis, editors, Springer
-
T. Vila, R. Greenstadt, and D. Molnar. Why we can't be bothered to read privacy policies. In L. J. Camp and S. Lewis, editors, Economics of Information Security, pages 143-153. Springer, 2004.
-
(2004)
Economics of Information Security
, pp. 143-153
-
-
Vila, T.1
Greenstadt, R.2
Molnar, D.3
|