-
2
-
-
3042782049
-
What is computer security?
-
Bishop, M. What is computer security? IEEE Security and Privacy, 1 , 1 (2003), 67-69.
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.1
, pp. 67-69
-
-
Bishop, M.1
-
3
-
-
22144439749
-
What?: Development of a role-based access control policy-writing tool for e-Scientists
-
Brostoff, S., Sasse, M. A., Chadwick, D., Cunningham, J., Mbanaso, U., and Otenko, S. R-What?: Development of a role-based access control policy-writing tool for e-Scientists. Software Practice and Experience, 35 , 9 (2005), 835-856.
-
(2005)
Software Practice and Experience
, vol.35
, Issue.9
, pp. 835-856
-
-
Brostoff, S.1
Sasse, M.A.2
Chadwick, D.3
Cunningham, J.4
Mbanaso, U.5
Otenko, S.R.6
-
4
-
-
84893108843
-
A framework for reasoning about the human in the loop
-
USENIX Association, Berkeley, CA, USA
-
Cranor, L. F. A framework for reasoning about the human in the loop. In UPSEC'08: Proceedings of the 1st Conference on Usability, Psychology, and Security. USENIX Association, Berkeley, CA, USA, 2008, 1-15.
-
(2008)
UPSEC'08: Proceedings of the 1st Conference on Usability, Psychology, and Security
, pp. 1-15
-
-
Cranor, L.F.1
-
5
-
-
33745807143
-
Social navigation as a model for usable security
-
ACM, Pittsburgh, Pennsylvania
-
DiGioia, P. and Dourish, P. Social navigation as a model for usable security. In SOUPS '05 . ACM, Pittsburgh, Pennsylvania, 2005, 101-108.
-
(2005)
SOUPS '05
, pp. 101-108
-
-
DiGioia, P.1
Dourish, P.2
-
6
-
-
84900482702
-
Security in the wild: User strategies for managing security as an everyday, practical problem
-
Dourish, P., Grinter, R. E., de la Flor, J. D., and Joseph, M. Security in the wild: user strategies for managing security as an everyday, practical problem. Personal and Ubiquitous Computing, 8 , 6 (2004), 391-401.
-
(2004)
Personal and Ubiquitous Computing
, vol.8
, Issue.6
, pp. 391-401
-
-
Dourish, P.1
Grinter, R.E.2
De La Flor, J.D.3
Joseph, M.4
-
7
-
-
34250737359
-
Decision strategies and susceptibility to phishing
-
ACM, New York, NY, USA
-
Downs, J. S., Holbrook, M. B., and Cranor, L. F. Decision strategies and susceptibility to phishing. In SOUPS '06 . ACM, New York, NY, USA, 2006, 79{90.
-
(2006)
SOUPS '06
, pp. 79-90
-
-
Downs, J.S.1
Holbrook, M.B.2
Cranor, L.F.3
-
8
-
-
78650143646
-
Acsac 2001 review
-
Ecclestone, R. Acsac 2001 review. Computers & Security, 21 , 1 (2001), 47-60.
-
(2001)
Computers & Security
, vol.21
, Issue.1
, pp. 47-60
-
-
Ecclestone, R.1
-
9
-
-
57649166927
-
You've been warned: An empirical study of the effectiveness of web browser phishing warnings
-
ACM, New York, NY, USA
-
Egelman, S., Cranor, L. F., and Hong, J. You've been warned: an empirical study of the effectiveness of web browser phishing warnings. In CHI '08: Proc. of the SIGCHI conf. on Human factors in Computing Systems. ACM, New York, NY, USA, 2008, 1065-1074.
-
(2008)
CHI '08: Proc. of the SIGCHI Conf. on Human Factors in Computing Systems
, pp. 1065-1074
-
-
Egelman, S.1
Cranor, L.F.2
Hong, J.3
-
10
-
-
0038049672
-
Users' conceptions of risks and harms on the web: A comparative study
-
ACM, New York, NY, USA
-
Friedman, B., Hurley, D., Howe, D. C., Nissenbaum, H., and Felten, E. Users' conceptions of risks and harms on the web: a comparative study. In CHI '02: CHI '02 extended abstracts on Human factors in computing systems. ACM, New York, NY, USA, 2002, 614-615.
-
(2002)
CHI '02: CHI '02 Extended Abstracts on Human Factors in Computing Systems
, pp. 614-615
-
-
Friedman, B.1
Hurley, D.2
Howe, D.C.3
Nissenbaum, H.4
Felten, E.5
-
11
-
-
33845531822
-
-
Ph.D. thesis, Massachusetts Institute of Technology, Cambridge, MA, USA Adviser-David D. Clark and Adviser-Robert C. Miller
-
Garfinkel, S. L. Design principles and patterns for computer systems that are simultaneously secure and usable. Ph.D. thesis, Massachusetts Institute of Technology, Cambridge, MA, USA (2005). Adviser-David D. Clark and Adviser-Robert C. Miller.
-
(2005)
Design Principles and Patterns for Computer Systems That Are Simultaneously Secure and Usable
-
-
Garfinkel, S.L.1
-
12
-
-
84883288662
-
Usable firewall configuration
-
Geng, W., Flinn, S., and DeDourek, J. Usable firewall configuration. In PST. 2005, 11 pages.
-
(2005)
PST
, pp. 11
-
-
Geng, W.1
Flinn, S.2
DeDourek, J.3
-
15
-
-
77953034467
-
Looking for trouble: Understanding end-user security management
-
ACM, New York, NY, USA
-
Gross, J. B. and Rosson, M. B. Looking for trouble: understanding end-user security management. In CHIMIT '07: Proceedings of the 2007 symposium on Computer human interaction for the management of information technology. ACM, New York, NY, USA, 2007, 10.
-
(2007)
CHIMIT '07: Proceedings of the 2007 Symposium on Computer Human Interaction for the Management of Information Technology
, pp. 10
-
-
Gross, J.B.1
Rosson, M.B.2
-
16
-
-
20744447916
-
Perceptions of end-users on the requirements in personal firewall software: An exploratory study
-
Hazari, S. Perceptions of end-users on the requirements in personal firewall software: An exploratory study. The Journal of Supercomputing, 17 , 3 (2005), 47-56.
-
(2005)
The Journal of Supercomputing
, vol.17
, Issue.3
, pp. 47-56
-
-
Hazari, S.1
-
18
-
-
0001746389
-
Examining the validity structure of qualitative research
-
Johnson, R. Examining the validity structure of qualitative research. Education, 118 , 2.
-
Education
, vol.118
, pp. 2
-
-
Johnson, R.1
-
19
-
-
0347025921
-
Security and human computer interfaces
-
Johnston, J., Eloffa, J. H. P., and Labuschagneb, L. Security and human computer interfaces. Computers and Security, 22 (2003), 675-684.
-
(2003)
Computers and Security
, vol.22
, pp. 675-684
-
-
Johnston, J.1
Eloffa, J.H.P.2
Labuschagneb, L.3
-
20
-
-
79958101213
-
When i am on wi-fi, i am fearless: Privacy concerns & practices in eeryday wi-fi use
-
ACM, New York, NY, USA
-
Klasnja, P., Consolvo, S., Jung, J., Greenstein, B. M., LeGrand, L., Powledge, P., and Wetherall, D. "when i am on wi-fi, i am fearless": privacy concerns & practices in eeryday wi-fi use. In CHI '09: Proceedings of the 27th international conference on Human factors in computing systems. ACM, New York, NY, USA, 2009, 1993-2002.
-
(2009)
CHI '09: Proceedings of the 27th International Conference on Human Factors in Computing Systems
, pp. 1993-2002
-
-
Klasnja, P.1
Consolvo, S.2
Jung, J.3
Greenstein, B.M.4
LeGrand, L.5
Powledge, P.6
Wetherall, D.7
-
21
-
-
70350757761
-
Privacy and security usable security: How to get it
-
Lampson, B. Privacy and security usable security: how to get it. Commun. ACM, 52 , 11 (2009), 25-27.
-
(2009)
Commun. ACM
, vol.52
, Issue.11
, pp. 25-27
-
-
Lampson, B.1
-
22
-
-
78650102872
-
Personal firewalls...one more step towards comprehensive security
-
McDermott, P. Personal firewalls...one more step towards comprehensive security. Network Security, 2000 , 11 (2000), 11-14.
-
(2000)
Network Security
, vol.2000
, Issue.11
, pp. 11-14
-
-
McDermott, P.1
-
23
-
-
0007757040
-
Methodology matters: Doing research in the behavioral and social sciences
-
Morgan Kaufmann Publishers Inc.
-
McGrath, J. E. Methodology matters: doing research in the behavioral and social sciences. Human-computer interaction: toward the year 2000 (1995), 152-169. Morgan Kaufmann Publishers Inc.
-
(1995)
Human-computer Interaction: Toward the Year 2000
, pp. 152-169
-
-
McGrath, J.E.1
-
24
-
-
0004257599
-
-
Morgan Kaufmann Publishers Inc., San Francisco, CA, USA
-
Nielsen, J. Usability Engineering. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 1993.
-
(1993)
Usability Engineering
-
-
Nielsen, J.1
-
26
-
-
70350733771
-
Revealing hidden context: Improving mental models of personal firewall users
-
ACM, New York, NY, USA
-
Raja, F., Hawkey, K., and Beznosov, K. Revealing hidden context: improving mental models of personal firewall users. In SOUPS '09 . ACM, New York, NY, USA, 2009, 1-12.
-
(2009)
SOUPS '09
, pp. 1-12
-
-
Raja, F.1
Hawkey, K.2
Beznosov, K.3
-
27
-
-
0016555241
-
The protection of information in computer systems
-
Saltzer, J. and Schroeder, M. The protection of information in computer systems. Proceedings of the IEEE, 63 , 9 (1975), 1278-1308.
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.1
Schroeder, M.2
-
28
-
-
0034241415
-
Whatever happened to qualitative description?
-
Sandelowski, M. Whatever happened to qualitative description? Research in Nursing & Health, 23 , 4 (2000), 334-340.
-
(2000)
Research in Nursing & Health
, vol.23
, Issue.4
, pp. 334-340
-
-
Sandelowski, M.1
-
31
-
-
57649180971
-
Sesame: Informing user security decisions with system visualization
-
ACM, New York, NY, USA
-
Stoll, J., Tashman, C. S., Edwards, W. K., and Spafford, K. Sesame: informing user security decisions with system visualization. In CHI . ACM, New York, NY, USA, 2008, 1045-1054.
-
(2008)
CHI
, pp. 1045-1054
-
-
Stoll, J.1
Tashman, C.S.2
Edwards, W.K.3
Spafford, K.4
-
33
-
-
3042539179
-
The use and usability of direction based filtering in firewalls
-
Wool, A. The use and usability of direction based filtering in firewalls. Computers and Security, 37 (2004), 459-468.
-
(2004)
Computers and Security
, vol.37
, pp. 459-468
-
-
Wool, A.1
|