-
1
-
-
0043232732
-
Users are not the enemy
-
December
-
A. Adams and M. A. Sasse. Users are not the enemy. Communications of the ACM, 42(12):40-46, December 1999.
-
(1999)
Communications of the ACM
, vol.42
, Issue.12
, pp. 40-46
-
-
Adams, A.1
Sasse, M.A.2
-
8
-
-
0038224887
-
How people construct mental models
-
D. Holland and N. Quinn, editors Cambridge University Press
-
A. Collins and D. Gentner. How people construct mental models. In D. Holland and N. Quinn, editors, Cultural Models in Language and Thought. Cambridge University Press, 1987.
-
(1987)
Cultural Models in Language and Thought
-
-
Collins, A.1
Gentner, D.2
-
12
-
-
84900482702
-
Security in the wild: User strategies for managing security as an everyday, practical problem
-
November
-
P. Dourish, R. Grinter, J. D. de la Flor, and M. Joseph. Security in the wild: User strategies for managing security as an everyday, practical problem. Personal and Ubiquitous Computing, 8(6):391-401, November 2004.
-
(2004)
Personal and Ubiquitous Computing
, vol.8
, Issue.6
, pp. 391-401
-
-
Dourish, P.1
Grinter, R.2
De La Flor, J.D.3
Joseph, M.4
-
13
-
-
58449093479
-
Internet security: Who is leaving the 'virtual door' open and why?
-
January
-
D. M. Downs, I. Ademaj, and A. M. Schuck. Internet security: Who is leaving the 'virtual door' open and why? First Monday, 14(1-5), January 2009.
-
(2009)
First Monday
, vol.14
, Issue.1-5
-
-
Downs, D.M.1
Ademaj, I.2
Schuck, A.M.3
-
14
-
-
84860353734
-
The work to make a home network work
-
September
-
R. E. Grinter, W. K. Edwards, M. W. Newman, and N. Ducheneaut. The work to make a home network work. In Proceedings of the 9th European Conference on Computer Supported Cooperative Work (ECSCW '05), pages 469-488, September 2005.
-
(2005)
Proceedings of the 9th European Conference on Computer Supported Cooperative Work (ECSCW '05)
, pp. 469-488
-
-
Grinter, R.E.1
Edwards, W.K.2
Newman, M.W.3
Ducheneaut, N.4
-
16
-
-
77950877250
-
So long, and no thanks for all the externalities: The rational rejection of security advice by users
-
September
-
C. Herley. So long, and no thanks for all the externalities: The rational rejection of security advice by users. In Proceedings of the New Security Paradigms Workshop (NSPW), September 2009.
-
(2009)
Proceedings of the New Security Paradigms Workshop (NSPW)
-
-
Herley, C.1
-
20
-
-
0001783241
-
Sampling in qualitative inquiry
-
B. Crabtree and W. L. Miller, editors chapter 2 Sage Publications, Inc.
-
A. J. Kuzel. Sampling in qualitative inquiry. In B. Crabtree and W. L. Miller, editors, Doing Qualitative Research, chapter 2, pages 31-44. Sage Publications, Inc., 1992.
-
(1992)
Doing Qualitative Research
, pp. 31-44
-
-
Kuzel, A.J.1
-
22
-
-
33645885367
-
Folkbiology of freshwater fish
-
April
-
D. Medin, N. Ross, S. Atran, D. Cox, J. Coley, J. Proffitt, and S. Blok. Folkbiology of freshwater fish. Cognition, 99(3):237-273, April 2006.
-
(2006)
Cognition
, vol.99
, Issue.3
, pp. 237-273
-
-
Medin, D.1
Ross, N.2
Atran, S.3
Cox, D.4
Coley, J.5
Proffitt, J.6
Blok, S.7
-
24
-
-
33847395831
-
Validity and qualitative research: An oxymoron?
-
A. J. Onwuegbuzie and N. L. Leech. Validity and qualitative research: An oxymoron? Quality and Quantity, 41:233-249, 2007.
-
(2007)
Quality and Quantity
, vol.41
, pp. 233-249
-
-
Onwuegbuzie, A.J.1
Leech, N.L.2
-
26
-
-
77956244475
-
Taxonomy of botnet threats
-
Trend Micro November
-
Trend Micro. Taxonomy of botnet threats. Whitepaper, November 2006.
-
(2006)
White Paper
-
-
|