-
1
-
-
0043232732
-
Users are not the enemy
-
A. Adams and M.A. Sasse. Users are not the enemy. Comm. of the ACM, 42(12):41–46, 1999.
-
(1999)
Comm. of the ACM
, vol.42
, Issue.12
, pp. 41-46
-
-
Adams, A.1
Sasse, M.A.2
-
3
-
-
84963173790
-
The minimal manual
-
J.M. Carroll, P.L. Smith-Kerker, J.R. Ford, and S.A. Mazur-Rimetz. The minimal manual. Human-Computer Interaction, 3:123–153, 1987-1988.
-
(1987)
Human-Computer Interaction
, vol.3
, pp. 123-153
-
-
Carroll, J.M.1
Smith-Kerker, P.L.2
Ford, J.R.3
Mazur-Rimetz, S.A.4
-
7
-
-
34250847613
-
Two experiences designing for effective security
-
Pittsburgh, July
-
R. DePaula, X. Ding, P. Dourish, K. Nies, B. Pillet, D. Redmiles, J. Ren, J. Rode, and R. Silva Filho. Two experiences designing for effective security. In First Symposium on Usable Privacy and Security (SOUPS 2005), Pittsburgh, July 2005.
-
(2005)
First Symposium on Usable Privacy and Security (SOUPS 2005)
-
-
DePaula, R.1
Ding, X.2
Dourish, P.3
Nies, K.4
Pillet, B.5
Redmiles, D.6
Ren, J.7
Rode, J.8
Silva Filho, R.9
-
9
-
-
0346271799
-
Beyond the five-user assumption: Benefits of increased sample sizes in usability testing
-
L. Faulkner. Beyond the five-user assumption: Benefits of increased sample sizes in usability testing. Behavior Research Methods, Instruments, & Computers, 35(3):379–383, 2003.
-
(2003)
Behavior Research Methods, Instruments, & Computers
, vol.35
, Issue.3
, pp. 379-383
-
-
Faulkner, L.1
-
13
-
-
34547163161
-
-
Technical report, Hewlett-Packard Laboratories, January
-
A. Karp. Site-specific passwords. Technical report, Hewlett-Packard Laboratories, January 2002.
-
(2002)
Site-Specific Passwords
-
-
Karp, A.1
-
15
-
-
85077699008
-
-
accessed January 2006
-
Password Maker web site, http://passwordmaker.org/, accessed January 2006.
-
Password Maker Web Site
-
-
-
16
-
-
0001859044
-
A technique for the measurement of attitudes
-
June
-
R. Likert. A technique for the measurement of attitudes. Archives of Psychology, 140, June 1932.
-
(1932)
Archives of Psychology
, vol.140
-
-
Likert, R.1
-
20
-
-
0002292167
-
Cognitive engineering
-
D.A. Norman and S.W. Draper, editors, chapter 3, Lawrence Erlbaum Associates, Publishers: Hillsdale, NJ
-
D.A. Norman. Cognitive engineering. In D.A. Norman and S.W. Draper, editors, User Centered System Design: New Perspectives on Human-Computer Interaction, chapter 3, pages 31–62. Lawrence Erlbaum Associates, Publishers: Hillsdale, NJ, 1986.
-
(1986)
User Centered System Design: New Perspectives on Human-Computer Interaction
, pp. 31-62
-
-
Norman, D.A.1
-
23
-
-
35348885452
-
Evaluating authentication mechanisms
-
L.F Cranor and S. Garfinkel, editors, chapter 6, O’Reilly Media
-
K. Renaud. Evaluating Authentication Mechanisms. In L.F Cranor and S. Garfinkel, editors, Security and Usability, chapter 6, pages 103–128. O’Reilly Media, 2005.
-
(2005)
Security and Usability
, pp. 103-128
-
-
Renaud, K.1
-
24
-
-
84863469085
-
Stronger password authentication using browser extensions
-
Baltimore, August
-
B. Ross, C. Jackson, N. Miyake, D. Boneh, and J. Mitchell. Stronger password authentication using browser extensions. In Proceedings of the 14th USENIX Security Symposium, Baltimore, August 2005.
-
(2005)
Proceedings of the 14th USENIX Security Symposium
-
-
Ross, B.1
Jackson, C.2
Miyake, N.3
Boneh, D.4
Mitchell, J.5
-
25
-
-
0016555241
-
The protection of information in computer systems
-
J.H. Saltzer and M.D. Schroeder. The protection of information in computer systems. Proceedings of the IEEE, 63(9):1278–1308, 1975.
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
26
-
-
35348863698
-
Usable security: Why do we need it? How do we get it?
-
L.F. Cranor and S. Garfinkel, editors, chapter 2, O’Reilly Media
-
M.A Sasse and I. Flechais. Usable Security: Why do we need it? How do we get it? In L.F. Cranor and S. Garfinkel, editors, Security and Usability, chapter 2, pages 13–30. O’Reilly Media, 2005.
-
(2005)
Security and Usability
, pp. 13-30
-
-
Sasse, M.A.1
Flechais, I.2
-
29
-
-
0026757295
-
Refining the test phase of usability evaluation: How many subjects is enough?
-
R.A. Virzi. Refining the test phase of usability evaluation: How many subjects is enough? Human Factors, 34:457–468, 1992.
-
(1992)
Human Factors
, vol.34
, pp. 457-468
-
-
Virzi, R.A.1
-
32
-
-
33748943409
-
Authentication using graphical passwords: Effects of tolerance and image choice
-
Pittsburgh, July
-
S. Wiedenbeck, J. Waters, J.-C. Birget, A. Broditskiy, and N. Memon. Authentication Using Graphical Passwords: Effects of Tolerance and Image Choice. In First Symposium on Usable Privacy and Security (SOUPS 2005), Pittsburgh, July 2005.
-
(2005)
First Symposium on Usable Privacy and Security (SOUPS 2005)
-
-
Wiedenbeck, S.1
Waters, J.2
Birget, J.-C.3
Broditskiy, A.4
Memon, N.5
|