메뉴 건너뛰기




Volumn , Issue , 2010, Pages

Folk models of home computer security

Author keywords

Folk models; Home security; Mental models

Indexed keywords

BOTNETS; COMPUTER SECURITY; COMPUTER USERS; FOLK MODELS; HOME SECURITY; MALWARES; MENTAL MODEL; SECURITY ADVICES; SECURITY INDUSTRY; SECURITY SOFTWARE; SECURITY THREATS; THIRD PARTIES;

EID: 77956243006     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1837110.1837125     Document Type: Conference Paper
Times cited : (81)

References (26)
  • 1
    • 0043232732 scopus 로고    scopus 로고
    • Users are not the enemy
    • December
    • A. Adams and M. A. Sasse. Users are not the enemy. Communications of the ACM, 42(12):40-46, December 1999.
    • (1999) Communications of the ACM , vol.42 , Issue.12 , pp. 40-46
    • Adams, A.1    Sasse, M.A.2
  • 8
    • 0038224887 scopus 로고
    • How people construct mental models
    • D. Holland and N. Quinn, editors Cambridge University Press
    • A. Collins and D. Gentner. How people construct mental models. In D. Holland and N. Quinn, editors, Cultural Models in Language and Thought. Cambridge University Press, 1987.
    • (1987) Cultural Models in Language and Thought
    • Collins, A.1    Gentner, D.2
  • 12
    • 84900482702 scopus 로고    scopus 로고
    • Security in the wild: User strategies for managing security as an everyday, practical problem
    • November
    • P. Dourish, R. Grinter, J. D. de la Flor, and M. Joseph. Security in the wild: User strategies for managing security as an everyday, practical problem. Personal and Ubiquitous Computing, 8(6):391-401, November 2004.
    • (2004) Personal and Ubiquitous Computing , vol.8 , Issue.6 , pp. 391-401
    • Dourish, P.1    Grinter, R.2    De La Flor, J.D.3    Joseph, M.4
  • 13
    • 58449093479 scopus 로고    scopus 로고
    • Internet security: Who is leaving the 'virtual door' open and why?
    • January
    • D. M. Downs, I. Ademaj, and A. M. Schuck. Internet security: Who is leaving the 'virtual door' open and why? First Monday, 14(1-5), January 2009.
    • (2009) First Monday , vol.14 , Issue.1-5
    • Downs, D.M.1    Ademaj, I.2    Schuck, A.M.3
  • 16
    • 77950877250 scopus 로고    scopus 로고
    • So long, and no thanks for all the externalities: The rational rejection of security advice by users
    • September
    • C. Herley. So long, and no thanks for all the externalities: The rational rejection of security advice by users. In Proceedings of the New Security Paradigms Workshop (NSPW), September 2009.
    • (2009) Proceedings of the New Security Paradigms Workshop (NSPW)
    • Herley, C.1
  • 20
    • 0001783241 scopus 로고
    • Sampling in qualitative inquiry
    • B. Crabtree and W. L. Miller, editors chapter 2 Sage Publications, Inc.
    • A. J. Kuzel. Sampling in qualitative inquiry. In B. Crabtree and W. L. Miller, editors, Doing Qualitative Research, chapter 2, pages 31-44. Sage Publications, Inc., 1992.
    • (1992) Doing Qualitative Research , pp. 31-44
    • Kuzel, A.J.1
  • 24
    • 33847395831 scopus 로고    scopus 로고
    • Validity and qualitative research: An oxymoron?
    • A. J. Onwuegbuzie and N. L. Leech. Validity and qualitative research: An oxymoron? Quality and Quantity, 41:233-249, 2007.
    • (2007) Quality and Quantity , vol.41 , pp. 233-249
    • Onwuegbuzie, A.J.1    Leech, N.L.2
  • 26
    • 77956244475 scopus 로고    scopus 로고
    • Taxonomy of botnet threats
    • Trend Micro November
    • Trend Micro. Taxonomy of botnet threats. Whitepaper, November 2006.
    • (2006) White Paper


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.