-
1
-
-
84893108843
-
A framework for reasoning about the human in the loop
-
Berkeley, CA, USA USENIX Association
-
L. F. Cranor. A framework for reasoning about the human in the loop. In UPSEC'08: Proceedings of the 1st Conference on Usability, Psychology, and Security, pages 1-15, Berkeley, CA, USA, 2008. USENIX Association.
-
(2008)
UPSEC'08: Proceedings of the 1st Conference on Usability, Psychology, and Security
, pp. 1-15
-
-
Cranor, L.F.1
-
2
-
-
70349185534
-
Family accounts: A new paradigm for user accounts within the home environment
-
New York, NY, USA ACM
-
S. Egelman, A. B. Brush, and K. M. Inkpen. Family accounts: a new paradigm for user accounts within the home environment. In CSCW '08: Proceedings of the 2008 ACM Conference on Computer Supported Cooperative Work, pages 669-678, New York, NY, USA, 2008. ACM.
-
(2008)
CSCW '08: Proceedings of the 2008 ACM Conference on Computer Supported Cooperative Work
, pp. 669-678
-
-
Egelman, S.1
Brush, A.B.2
Inkpen, K.M.3
-
3
-
-
57649166927
-
You've been warned: An empirical study of the effectiveness of web browser phishing warnings
-
New York, NY, USA ACM
-
S. Egelman, L. F. Cranor, and J. Hong. You've been warned: an empirical study of the effectiveness of web browser phishing warnings. In CHI '08: Proc. of the SIGCHI conf. on Human factors in Computing Systems, pages 1065-1074, New York, NY, USA, 2008. ACM.
-
(2008)
CHI '08: Proc. of the SIGCHI Conf. on Human Factors in Computing Systems
, pp. 1065-1074
-
-
Egelman, S.1
Cranor, L.F.2
Hong, J.3
-
4
-
-
35348898406
-
Security user studies: Methodologies and best practices
-
ACM
-
S. Egelman, J. King, R. C. Miller, N. Ragouzis, and E. Shehan. Security user studies: methodologies and best practices. In CHI Extended Abstracts, pages 2833-2836. ACM, 2007.
-
(2007)
CHI Extended Abstracts
, pp. 2833-2836
-
-
Egelman, S.1
King, J.2
Miller, R.C.3
Ragouzis, N.4
Shehan, E.5
-
6
-
-
29744452822
-
Java web start: Developing and distributing java applications for the client side
-
IBM Corp. Armonk, NY, September
-
S. Kim. Java web start: Developing and distributing Java applications for the client side. White paper, IBM Corp. Armonk, NY, September 2001. http://www.ibm.com/developerworks/java/library/j-webstart.
-
(2001)
White Paper
-
-
Kim, S.1
-
8
-
-
0007757040
-
Methodology matters: Doing research in the behavioral and social sciences
-
Morgan Kaufmann Publishers Inc
-
J. E. McGrath. Methodology matters: doing research in the behavioral and social sciences. Human-computer interaction: toward the year 2000, pages 152-169, 1995. Morgan Kaufmann Publishers Inc.
-
(1995)
Human-Computer Interaction: Toward the Year 2000
, pp. 152-169
-
-
McGrath, J.E.1
-
13
-
-
77956256320
-
-
February
-
Rootsudo. Ubuntu Documentation, https://help.ubuntu.com/community/ RootSudo, February 2010.
-
(2010)
Rootsudo
-
-
-
14
-
-
77956259978
-
-
August
-
C. A. Rusen. Windows 7 vs Windows Vista: the UAC Benchmark. http://www.7tutorials.com/windows-7-vs-windows-vista-uac-benchmark, August 2009.
-
(2009)
-
-
Rusen, C.A.1
-
16
-
-
0016555241
-
The protection of information in computer systems
-
Sept.
-
J. Saltzer and M. Schroeder. The protection of information in computer systems. Proceedings of the IEEE, 63(9):1278-1308, Sept. 1975.
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.1
Schroeder, M.2
-
18
-
-
11144338913
-
Intended and unintended consequences of warning messages: A review and synthesis of empirical research
-
D. W. Stewart and I. M. Martin. Intended and unintended consequences of warning messages: A review and synthesis of empirical research. Journal of Public Policy and Marketing, 13(1):1-19, 1994.
-
(1994)
Journal of Public Policy and Marketing
, vol.13
, Issue.1
, pp. 1-19
-
-
Stewart, D.W.1
Martin, I.M.2
-
19
-
-
33748549923
-
Polaris: Virus-safe computing for windows XP
-
M. Stiegler, A. H. Karp, K.-P. Yee, T. Close, and M. S. Miller. Polaris: virus-safe computing for Windows XP. Commun. ACM, 49(9):83-88, 2006.
-
(2006)
Commun. ACM
, vol.49
, Issue.9
, pp. 83-88
-
-
Stiegler, M.1
Karp, A.H.2
Yee, K.-P.3
Close, T.4
Miller, M.S.5
-
20
-
-
34547626765
-
A capability-based client: The DarpaBrowser
-
Inc., Meadowbrook, PA, June
-
M. Stiegler and M. Miller. A capability-based client: The DarpaBrowser. Technical report, Focused Research Topic 5. Combex, Inc., Meadowbrook, PA, June 2002.
-
(2002)
Technical Report, Focused Research Topic 5. Combex
-
-
Stiegler, M.1
Miller, M.2
-
21
-
-
84926351578
-
Crying wolf: An empirical study of SSL warning effectiveness
-
J. Sunshine, S. Egelman, H. Almuhimedi, N. Atri, and L. F. Cranor. Crying Wolf: An empirical study of SSL warning effectiveness. In Proceedings of 18th USENIX Security Symposium, pages 399-432, 2009.
-
(2009)
Proceedings of 18th USENIX Security Symposium
, pp. 399-432
-
-
Sunshine, J.1
Egelman, S.2
Almuhimedi, H.3
Atri, N.4
Cranor, L.F.5
-
24
-
-
77956232744
-
-
June
-
What's new in user account control. TechNet Library, http://technet. microsoft.com/en-us/library/dd446675(WS.10).aspx, June 2009.
-
(2009)
What's New in User Account Control
-
-
-
26
-
-
44349194326
-
Communication-human information processing (C-HIP) model
-
Lawrence Erlbaum Associates
-
M. Wogalter. Communication-Human Information Processing (C-HIP) Model. In Handbook of Warnings, pages 51-61. Lawrence Erlbaum Associates, 2006.
-
(2006)
Handbook of Warnings
, pp. 51-61
-
-
Wogalter, M.1
-
27
-
-
44349146652
-
Purpose and scope of warnings
-
Lawrence Erlbaum Associates
-
M. Wogalter. Purpose and scope of warnings. In Handbook of Warnings, pages 3-9. Lawrence Erlbaum Associates, 2006.
-
(2006)
Handbook of Warnings
, pp. 3-9
-
-
Wogalter, M.1
-
28
-
-
84948973276
-
Did you ever have to make up your mind? What notes users do when faced with a security decision
-
Washington, DC, USA IEEE Computer Society
-
M. E. Zurko, C. Kaufman, K. Spanbauer, and C. Bassett. Did you ever have to make up your mind? what notes users do when faced with a security decision. In ACSAC '02: Proceedings of the 18th Annual Computer Security Applications Conference, pages 371-381, Washington, DC, USA, 2002. IEEE Computer Society.
-
(2002)
ACSAC '02: Proceedings of the 18th Annual Computer Security Applications Conference
, pp. 371-381
-
-
Zurko, M.E.1
Kaufman, C.2
Spanbauer, K.3
Bassett, C.4
|