-
1
-
-
0043232732
-
Users are not the enemy. Why users compromise computer security mechanisms and how to take remedial measures
-
A. Adams, and M.A. Sasse, "Users are not the enemy. Why users compromise computer security mechanisms and how to take remedial measures," Communications of the ACM, vol. 42, no. 12, 1999, pp. 40-46.
-
(1999)
Communications of the ACM
, vol.42
, Issue.12
, pp. 40-46
-
-
Adams, A.1
Sasse, M.A.2
-
5
-
-
0006431226
-
Operant behavior
-
B.F. Skinner, "Operant behavior," American Psychologist, vol. 18, no. 8, 1963, pp. 503-515.
-
(1963)
American Psychologist
, vol.18
, Issue.8
, pp. 503-515
-
-
Skinner, B.F.1
-
8
-
-
0000019132
-
Application of social-learning theory to training supervisors through behavioral modeling
-
G.P. Latham, and L.M. Saari, "Application of social-learning theory to training supervisors through behavioral modeling," Journal of Applied Psychology, vol. 64, no. 3, 1979, pp. 239-246.
-
(1979)
Journal of Applied Psychology
, vol.64
, Issue.3
, pp. 239-246
-
-
Latham, G.P.1
Saari, L.M.2
-
9
-
-
33846283646
-
Hardening Web browsers against man-in-the-middle and eavesdropping attacks
-
ACM
-
H. Xia, and J.C. Brustoloni, "Hardening Web browsers against man-in-the-middle and eavesdropping attacks," in proc. WWW, ACM, 2005, pp. 489-498.
-
(2005)
Proc. WWW
, pp. 489-498
-
-
Xia, H.1
Brustoloni, J.C.2
-
11
-
-
84926351578
-
Crying Wolf: An Empirical Study of SSL Warning Effectiveness
-
J. Sunshine, S. Egelman, H. Almuhimedi, N. Atri, & L. Cranor, "Crying Wolf: An Empirical Study of SSL Warning Effectiveness," in Proc. USENIX Security 2009
-
Proc. USENIX Security 2009
-
-
Sunshine, J.1
Egelman, S.2
Almuhimedi, H.3
Atri, N.4
Cranor, L.5
-
12
-
-
36849077630
-
Improving security decisions with polymorphic and audited di-alogs
-
J.C. Brustoloni, and R. Villamarín-Salomón, "Improving security decisions with polymorphic and audited di-alogs," in Proc. SOUPS, 2007, pp. 76-85.
-
Proc. SOUPS, 2007
, pp. 76-85
-
-
Brustoloni, J.C.1
Villamarín-Salomón, R.2
-
13
-
-
35348863698
-
Usable Security: Why do we need it? How do we get it
-
L. Cranor, and S. Garfinkel eds., O'Reilly
-
M.A. Sasse, and I. Flechais, "Usable Security: Why do we need it? How do we get it," in Security and Usability: Designing Secure Systems That People Can Use, L. Cranor, and S. Garfinkel eds., O'Reilly, 2005, pp. 13-30.
-
(2005)
Security and Usability: Designing Secure Systems That People Can Use
, pp. 13-30
-
-
Sasse, M.A.1
Flechais, I.2
-
15
-
-
77953876778
-
Getting users to pay attention to anti-phishing education: Evaluation of retention and transfer
-
P. Kumaraguru, Y. Rhee, S. Sheng, S. Hasan, A. Acquisti, L.F. Cranor, and J. Hong, "Getting users to pay attention to anti-phishing education: evaluation of retention and transfer," in Proc. APWG's annual eCrime researchers summit, 2007, pp. 70-81.
-
Proc. APWG's Annual ECrime Researchers Summit, 2007
, pp. 70-81
-
-
Kumaraguru, P.1
Rhee, Y.2
Sheng, S.3
Hasan, S.4
Acquisti, A.5
Cranor, L.F.6
Hong, J.7
-
16
-
-
84965419610
-
The enhancement of behavior modeling training of supervisory skills by the inclusion of retention processes
-
P.J. Decker, "The enhancement of behavior modeling training of supervisory skills by the inclusion of retention processes," Personnel psychology, vol. 35, no. 2, 1982
-
(1982)
Personnel Psychology
, vol.35
, Issue.2
-
-
Decker, P.J.1
-
19
-
-
60649111224
-
You've Been Warned: An Empirical Study of the Effectiveness of Web Browser Phishing Warnings
-
S. Egelman, L.F. Cranor, and J. Hong, "You've Been Warned: An Empirical Study of the Effectiveness of Web Browser Phishing Warnings," in Proc. CHI, 2008.
-
Proc. CHI, 2008
-
-
Egelman, S.1
Cranor, L.F.2
Hong, J.3
-
20
-
-
36849073159
-
Anti-Phishing Phil: The design and evaluation of a game that teaches people not to fall for phish
-
S. Sheng, B. Magnien, P. Kumaraguru, A. Acquisti, L.F. Cranor, J. Hong, and E. Nunge, "Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish," in Proc. SOUPS 2007, pp. 88-99.
-
Proc. SOUPS 2007
, pp. 88-99
-
-
Sheng, S.1
Magnien, B.2
Kumaraguru, P.3
Acquisti, A.4
Cranor, L.F.5
Hong, J.6
Nunge, E.7
-
21
-
-
77954009340
-
-
VSR intervention; http://vsr.securityconditioning.org
-
VSR Intervention
-
-
|