메뉴 건너뛰기




Volumn 1, Issue , 2010, Pages 363-372

Using reinforcement to strengthen users' secure behaviors

Author keywords

audited dialogs; context sensitive guidance; observational learning; operant conditioning; polymorphic dialogs; security reinforcing application; social learning theory; vicarious learning; vicarious security reinforcement

Indexed keywords

CONTEXT-SENSITIVE; OBSERVATIONAL LEARNING; OPERANT CONDITIONING; SECURITY-REINFORCING APPLICATION; SOCIAL LEARNING THEORY; VICARIOUS LEARNING;

EID: 77954000731     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1753326.1753382     Document Type: Conference Paper
Times cited : (13)

References (21)
  • 1
    • 0043232732 scopus 로고    scopus 로고
    • Users are not the enemy. Why users compromise computer security mechanisms and how to take remedial measures
    • A. Adams, and M.A. Sasse, "Users are not the enemy. Why users compromise computer security mechanisms and how to take remedial measures," Communications of the ACM, vol. 42, no. 12, 1999, pp. 40-46.
    • (1999) Communications of the ACM , vol.42 , Issue.12 , pp. 40-46
    • Adams, A.1    Sasse, M.A.2
  • 5
    • 0006431226 scopus 로고
    • Operant behavior
    • B.F. Skinner, "Operant behavior," American Psychologist, vol. 18, no. 8, 1963, pp. 503-515.
    • (1963) American Psychologist , vol.18 , Issue.8 , pp. 503-515
    • Skinner, B.F.1
  • 8
    • 0000019132 scopus 로고
    • Application of social-learning theory to training supervisors through behavioral modeling
    • G.P. Latham, and L.M. Saari, "Application of social-learning theory to training supervisors through behavioral modeling," Journal of Applied Psychology, vol. 64, no. 3, 1979, pp. 239-246.
    • (1979) Journal of Applied Psychology , vol.64 , Issue.3 , pp. 239-246
    • Latham, G.P.1    Saari, L.M.2
  • 9
    • 33846283646 scopus 로고    scopus 로고
    • Hardening Web browsers against man-in-the-middle and eavesdropping attacks
    • ACM
    • H. Xia, and J.C. Brustoloni, "Hardening Web browsers against man-in-the-middle and eavesdropping attacks," in proc. WWW, ACM, 2005, pp. 489-498.
    • (2005) Proc. WWW , pp. 489-498
    • Xia, H.1    Brustoloni, J.C.2
  • 12
    • 36849077630 scopus 로고    scopus 로고
    • Improving security decisions with polymorphic and audited di-alogs
    • J.C. Brustoloni, and R. Villamarín-Salomón, "Improving security decisions with polymorphic and audited di-alogs," in Proc. SOUPS, 2007, pp. 76-85.
    • Proc. SOUPS, 2007 , pp. 76-85
    • Brustoloni, J.C.1    Villamarín-Salomón, R.2
  • 16
    • 84965419610 scopus 로고
    • The enhancement of behavior modeling training of supervisory skills by the inclusion of retention processes
    • P.J. Decker, "The enhancement of behavior modeling training of supervisory skills by the inclusion of retention processes," Personnel psychology, vol. 35, no. 2, 1982
    • (1982) Personnel Psychology , vol.35 , Issue.2
    • Decker, P.J.1
  • 19
    • 60649111224 scopus 로고    scopus 로고
    • You've Been Warned: An Empirical Study of the Effectiveness of Web Browser Phishing Warnings
    • S. Egelman, L.F. Cranor, and J. Hong, "You've Been Warned: An Empirical Study of the Effectiveness of Web Browser Phishing Warnings," in Proc. CHI, 2008.
    • Proc. CHI, 2008
    • Egelman, S.1    Cranor, L.F.2    Hong, J.3
  • 21
    • 77954009340 scopus 로고    scopus 로고
    • VSR intervention; http://vsr.securityconditioning.org
    • VSR Intervention


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.