메뉴 건너뛰기




Volumn , Issue , 2010, Pages 53-62

It's too complicated, so i turned it off! Expectations, perceptions, and misconceptions of personal firewalls

Author keywords

personal firewall; usable security

Indexed keywords

BEHAVIOR-BASED; NETWORK SETTINGS; PERSONAL FIREWALLS; QUALITATIVE ANALYSIS; SECURITY APPLICATION; SEMI STRUCTURED INTERVIEWS; USABLE SECURITY;

EID: 78650116009     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1866898.1866907     Document Type: Conference Paper
Times cited : (18)

References (33)
  • 2
    • 3042782049 scopus 로고    scopus 로고
    • What is computer security?
    • Bishop, M. What is computer security? IEEE Security and Privacy, 1 , 1 (2003), 67-69.
    • (2003) IEEE Security and Privacy , vol.1 , Issue.1 , pp. 67-69
    • Bishop, M.1
  • 5
    • 33745807143 scopus 로고    scopus 로고
    • Social navigation as a model for usable security
    • ACM, Pittsburgh, Pennsylvania
    • DiGioia, P. and Dourish, P. Social navigation as a model for usable security. In SOUPS '05 . ACM, Pittsburgh, Pennsylvania, 2005, 101-108.
    • (2005) SOUPS '05 , pp. 101-108
    • DiGioia, P.1    Dourish, P.2
  • 6
    • 84900482702 scopus 로고    scopus 로고
    • Security in the wild: User strategies for managing security as an everyday, practical problem
    • Dourish, P., Grinter, R. E., de la Flor, J. D., and Joseph, M. Security in the wild: user strategies for managing security as an everyday, practical problem. Personal and Ubiquitous Computing, 8 , 6 (2004), 391-401.
    • (2004) Personal and Ubiquitous Computing , vol.8 , Issue.6 , pp. 391-401
    • Dourish, P.1    Grinter, R.E.2    De La Flor, J.D.3    Joseph, M.4
  • 7
    • 34250737359 scopus 로고    scopus 로고
    • Decision strategies and susceptibility to phishing
    • ACM, New York, NY, USA
    • Downs, J. S., Holbrook, M. B., and Cranor, L. F. Decision strategies and susceptibility to phishing. In SOUPS '06 . ACM, New York, NY, USA, 2006, 79{90.
    • (2006) SOUPS '06 , pp. 79-90
    • Downs, J.S.1    Holbrook, M.B.2    Cranor, L.F.3
  • 8
    • 78650143646 scopus 로고    scopus 로고
    • Acsac 2001 review
    • Ecclestone, R. Acsac 2001 review. Computers & Security, 21 , 1 (2001), 47-60.
    • (2001) Computers & Security , vol.21 , Issue.1 , pp. 47-60
    • Ecclestone, R.1
  • 12
    • 84883288662 scopus 로고    scopus 로고
    • Usable firewall configuration
    • Geng, W., Flinn, S., and DeDourek, J. Usable firewall configuration. In PST. 2005, 11 pages.
    • (2005) PST , pp. 11
    • Geng, W.1    Flinn, S.2    DeDourek, J.3
  • 16
    • 20744447916 scopus 로고    scopus 로고
    • Perceptions of end-users on the requirements in personal firewall software: An exploratory study
    • Hazari, S. Perceptions of end-users on the requirements in personal firewall software: An exploratory study. The Journal of Supercomputing, 17 , 3 (2005), 47-56.
    • (2005) The Journal of Supercomputing , vol.17 , Issue.3 , pp. 47-56
    • Hazari, S.1
  • 18
    • 0001746389 scopus 로고    scopus 로고
    • Examining the validity structure of qualitative research
    • Johnson, R. Examining the validity structure of qualitative research. Education, 118 , 2.
    • Education , vol.118 , pp. 2
    • Johnson, R.1
  • 21
    • 70350757761 scopus 로고    scopus 로고
    • Privacy and security usable security: How to get it
    • Lampson, B. Privacy and security usable security: how to get it. Commun. ACM, 52 , 11 (2009), 25-27.
    • (2009) Commun. ACM , vol.52 , Issue.11 , pp. 25-27
    • Lampson, B.1
  • 22
    • 78650102872 scopus 로고    scopus 로고
    • Personal firewalls...one more step towards comprehensive security
    • McDermott, P. Personal firewalls...one more step towards comprehensive security. Network Security, 2000 , 11 (2000), 11-14.
    • (2000) Network Security , vol.2000 , Issue.11 , pp. 11-14
    • McDermott, P.1
  • 23
    • 0007757040 scopus 로고
    • Methodology matters: Doing research in the behavioral and social sciences
    • Morgan Kaufmann Publishers Inc.
    • McGrath, J. E. Methodology matters: doing research in the behavioral and social sciences. Human-computer interaction: toward the year 2000 (1995), 152-169. Morgan Kaufmann Publishers Inc.
    • (1995) Human-computer Interaction: Toward the Year 2000 , pp. 152-169
    • McGrath, J.E.1
  • 24
    • 0004257599 scopus 로고
    • Morgan Kaufmann Publishers Inc., San Francisco, CA, USA
    • Nielsen, J. Usability Engineering. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 1993.
    • (1993) Usability Engineering
    • Nielsen, J.1
  • 26
    • 70350733771 scopus 로고    scopus 로고
    • Revealing hidden context: Improving mental models of personal firewall users
    • ACM, New York, NY, USA
    • Raja, F., Hawkey, K., and Beznosov, K. Revealing hidden context: improving mental models of personal firewall users. In SOUPS '09 . ACM, New York, NY, USA, 2009, 1-12.
    • (2009) SOUPS '09 , pp. 1-12
    • Raja, F.1    Hawkey, K.2    Beznosov, K.3
  • 27
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • Saltzer, J. and Schroeder, M. The protection of information in computer systems. Proceedings of the IEEE, 63 , 9 (1975), 1278-1308.
    • (1975) Proceedings of the IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.1    Schroeder, M.2
  • 28
    • 0034241415 scopus 로고    scopus 로고
    • Whatever happened to qualitative description?
    • Sandelowski, M. Whatever happened to qualitative description? Research in Nursing & Health, 23 , 4 (2000), 334-340.
    • (2000) Research in Nursing & Health , vol.23 , Issue.4 , pp. 334-340
    • Sandelowski, M.1
  • 31
    • 57649180971 scopus 로고    scopus 로고
    • Sesame: Informing user security decisions with system visualization
    • ACM, New York, NY, USA
    • Stoll, J., Tashman, C. S., Edwards, W. K., and Spafford, K. Sesame: informing user security decisions with system visualization. In CHI . ACM, New York, NY, USA, 2008, 1045-1054.
    • (2008) CHI , pp. 1045-1054
    • Stoll, J.1    Tashman, C.S.2    Edwards, W.K.3    Spafford, K.4
  • 33
    • 3042539179 scopus 로고    scopus 로고
    • The use and usability of direction based filtering in firewalls
    • Wool, A. The use and usability of direction based filtering in firewalls. Computers and Security, 37 (2004), 459-468.
    • (2004) Computers and Security , vol.37 , pp. 459-468
    • Wool, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.