메뉴 건너뛰기




Volumn , Issue , 2010, Pages

Where do security policies come from?

Author keywords

[No Author keywords available]

Indexed keywords

INVERSE CORRELATION; SECURITY IMPROVEMENT; SECURITY POLICY;

EID: 77956241667     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1837110.1837124     Document Type: Conference Paper
Times cited : (25)

References (42)
  • 1
    • 77956260256 scopus 로고    scopus 로고
    • http://www.internetworldstats.com.
  • 2
    • 77956260126 scopus 로고    scopus 로고
    • http://www.worldmapper.org/display.php?selected=336.
  • 3
    • 77956237167 scopus 로고    scopus 로고
    • http://www.openwall.com/john/.
  • 4
    • 77956248559 scopus 로고    scopus 로고
    • Regulation E of the Federal Reserve Board. http://ecfr.gpoaccess.gov/cgi/ t/text/text-idx?c=ecfr&sid=0283a311c8b13f29f284816d4dc5aeb7&rgn= div9&view=text&node=12:2.0.1.1.6.0.3.19.14&idno=12.
    • Regulation e of the Federal Reserve Board
  • 6
    • 77956240595 scopus 로고    scopus 로고
    • Wells Fargo: Online Security Guarantee. https://www.wellsfargo.com/ privacy-security/online/guarantee.
  • 7
    • 77956247217 scopus 로고    scopus 로고
    • Wired: Weak Password Brings 'Happiness' to Twitter Hacker. http://blog.wired.com/27bstroke6/2009/01/professed-twitt.html.
  • 8
    • 77956234268 scopus 로고
    • Department of Defense Password Management Guideline U.S. Dept. of Defense, Computer Security Center
    • Department of Defense Password Management Guideline. Technical Report CSC-STD-002-85, U.S. Dept. of Defense, Computer Security Center, 1985.
    • (1985) Technical Report CSC-STD-002-85
  • 10
    • 70350697293 scopus 로고    scopus 로고
    • The compliance budget: Managing security behaviour in organisations
    • A. Beautement, M.A. Sasse and M. Wonham. The Compliance Budget: Managing Security Behaviour in Organisations. NSPW, 2008.
    • (2008) NSPW
    • Beautement, A.1    Sasse, M.A.2    Wonham, M.3
  • 11
    • 0043232732 scopus 로고    scopus 로고
    • Users are not the enemy
    • A. Adams and M. A. Sasse. Users Are Not the Enemy. Commun. ACM, 42(12), 1999.
    • (1999) Commun. ACM , vol.42 , Issue.12
    • Adams, A.1    Sasse, M.A.2
  • 12
    • 77956252482 scopus 로고    scopus 로고
    • Avira TechBlog. The Most Phished Brands of 2009. http://techblog.avira. com/2009/12/19/the-most-phished-brands-of-2009/en/.
    • The Most Phished Brands of 2009
  • 14
    • 70849087587 scopus 로고    scopus 로고
    • The way I see it: When security gets in the way
    • D.A. Norman. The Way I See It: When security gets in the way. Interactions, 16(6):60-63, 2009.
    • (2009) Interactions , vol.16 , Issue.6 , pp. 60-63
    • Norman, D.A.1
  • 17
    • 77956241508 scopus 로고    scopus 로고
    • Federal Financial Institutions Examination Council. Top 50 Bank Holding Companies 2009. http://www.ffiec.gov/nicpubweb/nicweb/Top50form.aspx.
    • (2009) Top 50 Bank Holding Companies
  • 18
    • 35348884906 scopus 로고    scopus 로고
    • A large-scale study of web password habits
    • Banff
    • D. Florêncio and C. Herley. A Large-Scale Study of Web Password Habits. WWW 2007, Banff.
    • (2007) WWW
    • Florêncio, D.1    Herley, C.2
  • 19
    • 48049095953 scopus 로고    scopus 로고
    • Stopping phishing attacks even when the victims ignore warnings
    • D. Florêncio and C. Herley. Stopping Phishing Attacks Even when the Victims Ignore Warnings. MSR Tech. Report, 2005.
    • (2005) MSR Tech. Report
    • Florêncio, D.1    Herley, C.2
  • 20
    • 77956250255 scopus 로고    scopus 로고
    • KLASSP: Entering passwords on a spyware infected machine
    • D. Florêncio and C. Herley. KLASSP: Entering Passwords on a Spyware Infected Machine. ACSAC, 2006.
    • (2006) ACSAC
    • Florêncio, D.1    Herley, C.2
  • 23
    • 77950877250 scopus 로고    scopus 로고
    • So long, and no thanks for the externalities: The rational rejection of security advice by users
    • Oxford
    • C. Herley. So Long, And No Thanks for the Externalities: The Rational Rejection of Security Advice by Users. NSPW 2009, Oxford.
    • (2009) NSPW
    • Herley, C.1
  • 24
    • 84856038557 scopus 로고    scopus 로고
    • A profitless endeavor: Phishing as tragedy of the commons
    • Lake Tahoe, CA
    • C. Herley and D. Florêncio. A Profitless Endeavor: Phishing as Tragedy of the Commons. NSPW 2008, Lake Tahoe, CA.
    • (2008) NSPW
    • Herley, C.1    Florêncio, D.2
  • 25
    • 81255149250 scopus 로고    scopus 로고
    • Nobody sells gold for the price of silver: Dishonesty, uncertainty and the underground economy
    • London
    • C. Herley and D. Florêncio. Nobody Sells Gold for the Price of Silver: Dishonesty, Uncertainty and the Underground Economy. WEIS 2009, London.
    • (2009) WEIS
    • Herley, C.1    Florêncio, D.2
  • 29
    • 77956251589 scopus 로고    scopus 로고
    • The password thicket: Technical and market failures in human authentication on the web
    • J. Bonneau and S. Preibusch. The Password Thicket: technical and Market Failures in Human Authentication on the Web. WEIS, 2010.
    • (2010) WEIS
    • Bonneau, J.1    Preibusch, S.2
  • 30
    • 77952415099 scopus 로고    scopus 로고
    • An inquiry into the nature and causes of the wealth of internet miscreants
    • J. Franklin and V. Paxson and A. Perrig and S. Savage. An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants. Proc. CCS, 2007.
    • (2007) Proc. CCS
    • Franklin, J.1    Paxson, V.2    Perrig, A.3    Savage, S.4
  • 33
    • 70450257560 scopus 로고    scopus 로고
    • Security and usability: The gap in real-world online banking
    • M. Mannan and P.C. van Oorschot. Security and Usability: The Gap in Real-World Online Banking. NSPW, 2007.
    • (2007) NSPW
    • Mannan, M.1    Van Oorschot, P.C.2
  • 34
    • 0035387175 scopus 로고    scopus 로고
    • Transforming the "weakest link": A human-computer interaction approach to usable and effective security
    • M.A. Sasse, S. Brostoff and D. Weirich. Transforming the "weakest link": a human-computer interaction approach to usable and effective security. In BT Technology Journal, 2001.
    • (2001) BT Technology Journal
    • Sasse, M.A.1    Brostoff, S.2    Weirich, D.3
  • 35
  • 37
    • 77953963809 scopus 로고    scopus 로고
    • The true cost of unusable password policies: Password use in the wild
    • P. Inglesant and M. A. Sasse. The True Cost of Unusable Password Policies: Password use in the Wild. CHI, 2010.
    • (2010) CHI
    • Inglesant, P.1    Sasse, M.A.2
  • 38
    • 33750906057 scopus 로고    scopus 로고
    • On countering online dictionary attacks with login histories and humans-in-the-loop
    • P.C. van Oorschot, S. Stubblebine. On Countering Online Dictionary Attacks with Login Histories and Humans-in-the-Loop. ACM TISSEC vol. 9 issue 3, 2006.
    • (2006) ACM TISSEC , vol.9 , Issue.3
    • Van Oorschot, P.C.1    Stubblebine, S.2
  • 41
    • 35248846782 scopus 로고    scopus 로고
    • Password management strategies for online accounts
    • S. Gaw and E.W. Felten. Password Management Strategies for Online Accounts. Proc. SOUPS.
    • Proc. SOUPS
    • Gaw, S.1    Felten, E.W.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.