-
1
-
-
14744275332
-
Privacy and rationality in individual decision making
-
A. Acquisti, and J. Grossklags Privacy and rationality in individual decision making IEEE Security and Privacy 3 2005 26 33
-
(2005)
IEEE Security and Privacy
, vol.3
, pp. 26-33
-
-
Acquisti, A.1
Grossklags, J.2
-
6
-
-
84869437293
-
Economic methods and decision making by security professionals
-
WEIS 2011, Fairfax, USA
-
Baldwin, A.; Beres, Y.; Duggan, G.B.; Cassa Mont, M.; Johnson, H.; Middup, C.; Shiu, S.; 2011. Economic methods and decision making by security professionals. In: Proceedings of the Tenth Workshop on Economics and Information Security, WEIS 2011, Fairfax, USA.
-
(2011)
Proceedings of the Tenth Workshop on Economics and Information Security
-
-
Baldwin, A.1
Beres, Y.2
Duggan, G.B.3
Cassa Mont, M.4
Johnson, H.5
Middup, C.6
Shiu, S.7
-
7
-
-
71749099834
-
The economics of user effort in information security
-
A. Beautement, and M.A. Sasse The economics of user effort in information security Computer Fraud & Security 10 2009 8 12
-
(2009)
Computer Fraud & Security
, vol.10
, pp. 8-12
-
-
Beautement, A.1
Sasse, M.A.2
-
18
-
-
35348884906
-
A large scale study of web password habits
-
Banff, Alberta, Canada
-
Florencio, D.; Herley, C.; 2007. A large scale study of web password habits. In: Proceedings of the 16th International Conference on World Wide Web, Banff, Alberta, Canada, pp. 657-666.
-
(2007)
Proceedings of the 16th International Conference on World Wide Web
, pp. 657-666
-
-
Florencio, D.1
Herley, C.2
-
20
-
-
34250729756
-
Password management strategies for online accounts
-
SOUPS06, Pittsburgh, USA
-
Gaw, S.; Felten, E.W.; 2006. Password management strategies for online accounts. In: Proceedings of the Symposium on Usable Privacy and Security, SOUPS06, Pittsburgh, USA, pp. 44-55.
-
(2006)
Proceedings of the Symposium on Usable Privacy and Security
, pp. 44-55
-
-
Gaw, S.1
Felten, E.W.2
-
21
-
-
79957818269
-
Using and managing multiple passwords: A week to a view
-
B. Grawemeyer, and H. Johnson Using and managing multiple passwords: a week to a view Interacting with Computers 23 2011 256 267
-
(2011)
Interacting with Computers
, vol.23
, pp. 256-267
-
-
Grawemeyer, B.1
Johnson, H.2
-
22
-
-
77950877250
-
So long and no thanks for the externalities: The rational rejection of security advice by users
-
NSPW09, Oxford, UK
-
Herley, C.; 2009. So long and no thanks for the externalities: the rational rejection of security advice by users. In: Proceedings of the New Security Paradigms Workshop, NSPW09, Oxford, UK.
-
(2009)
Proceedings of the New Security Paradigms Workshop
-
-
Herley, C.1
-
23
-
-
77951550003
-
Password authentication from a human factors perspective: Results of a survey among end-users
-
San Antonio, USA
-
Hoonakker, P.; Bornoe, N.; Carayon, P.; 2009. Password authentication from a human factors perspective: results of a survey among end-users. In: Proceedings of the Human Factors and Ergonomics Society 53rd Annual Meeting, San Antonio, USA, pp. 459-463.
-
(2009)
Proceedings of the Human Factors and Ergonomics Society 53rd Annual Meeting
, pp. 459-463
-
-
Hoonakker, P.1
Bornoe, N.2
Carayon, P.3
-
24
-
-
70350440484
-
Rational adaptation under task and processing constraints: Implications for testing theories of cognition and action
-
A. Howes, R.L. Lewis, and A. Vera Rational adaptation under task and processing constraints: implications for testing theories of cognition and action Psychological Review 116 4 2009 717 751
-
(2009)
Psychological Review
, vol.116
, Issue.4
, pp. 717-751
-
-
Howes, A.1
Lewis, R.L.2
Vera, A.3
-
25
-
-
77953963809
-
The true cost of unusable password policies: Password use in the wild
-
CHI10, Atlanta, USA
-
Inglesant, P.; Sasse, M.A.; 2010. The true cost of unusable password policies: password use in the wild. In: Proceedings of the ACM Conference on Human Factors in Computing Systems, CHI10, Atlanta, USA, pp. 382-392.
-
(2010)
Proceedings of the ACM Conference on Human Factors in Computing Systems
, pp. 382-392
-
-
Inglesant, P.1
Sasse, M.A.2
-
28
-
-
3042856064
-
Towards modeling individual and collaborative construction of jigsaws using task knowledge structures (TKS)
-
H. Johnson, and J. Hyde Towards modeling individual and collaborative construction of jigsaws using task knowledge structures (TKS) ACM Transactions on Computer-Human Interaction 10 2003 339 387
-
(2003)
ACM Transactions on Computer-Human Interaction
, vol.10
, pp. 339-387
-
-
Johnson, H.1
Hyde, J.2
-
29
-
-
0024891989
-
Integrating task analysis into system design surveying designers needs
-
H. Johnson, and P. Johnson Integrating task analysis into system design surveying designers needs Ergonomics 32 1989 1451 1467
-
(1989)
Ergonomics
, vol.32
, pp. 1451-1467
-
-
Johnson, H.1
Johnson, P.2
-
30
-
-
0242267471
-
A perspective on judgement and choice: Mapping bounded rationality
-
D. Kahneman A perspective on judgement and choice: mapping bounded rationality American Psychologist 58 2003 697 720
-
(2003)
American Psychologist
, vol.58
, pp. 697-720
-
-
Kahneman, D.1
-
31
-
-
79958161706
-
Of passwords and people: Measuring the effect of password-composition policies
-
CHI11, Vancouver, Canada
-
Komanduri, S.; Shay, R.; Kelley, P.G.; Mazurek, M.L.; Bauer, L.; Christin, N.; Cranor, L.F.; Egelman, S.; 2011. Of passwords and people: measuring the effect of password-composition policies. In: Proceedings of the ACM Conference on Human Factors in Computing Systems, CHI11, Vancouver, Canada, pp. 2595-2604.
-
(2011)
Proceedings of the ACM Conference on Human Factors in Computing Systems
, pp. 2595-2604
-
-
Komanduri, S.1
Shay, R.2
Kelley, P.G.3
Mazurek, M.L.4
Bauer, L.5
Christin, N.6
Cranor, L.F.7
Egelman, S.8
-
35
-
-
0001281286
-
Rational expectations and the theory of price movements
-
J.F. Muth Rational expectations and the theory of price movements Econometrica 29 1961 315 335
-
(1961)
Econometrica
, vol.29
, pp. 315-335
-
-
Muth, J.F.1
-
36
-
-
0032651273
-
Representations and user-developer interaction in cooperative analysis and design
-
E.J. ONeill, P. Johnson, and H. Johnson Representations and user-developer interaction in cooperative analysis and design Human-Computer Interaction 14 1, 2 1999 43 91
-
(1999)
Human-Computer Interaction
, vol.14
, Issue.1-2
, pp. 43-91
-
-
Oneill, E.J.1
Johnson, P.2
Johnson, H.3
-
38
-
-
78751561459
-
A stealth approach to usable security: Helping IT security managers to identify workable security solutions
-
NSPW10, Concord, USA
-
Parkin, S.; van Moorsel, A.; Inglesant, P.; Sasse, M.A.; 2010. A stealth approach to usable security: helping IT security managers to identify workable security solutions. In: Proceedings of the New Security Paradigms Workshop, NSPW10, Concord, USA.
-
(2010)
Proceedings of the New Security Paradigms Workshop
-
-
Parkin, S.1
Van Moorsel, A.2
Inglesant, P.3
Sasse, M.A.4
-
39
-
-
34548837727
-
Discretionary task interleaving: Heuristics for time allocation in cognitive foraging
-
S.J. Payne, G.B. Duggan, and H. Neth Discretionary task interleaving: heuristics for time allocation in cognitive foraging Journal of Experimental Psychology: General 136 2007 370 388
-
(2007)
Journal of Experimental Psychology: General
, vol.136
, pp. 370-388
-
-
Payne, S.J.1
Duggan, G.B.2
Neth, H.3
-
41
-
-
0036168936
-
Empirically grounded clinical interventions: Cognitive-behavioural therapy progresses through a multi-dimensional approach to clinical science
-
P.M. Salkovskis Empirically grounded clinical interventions: cognitive-behavioural therapy progresses through a multi-dimensional approach to clinical science Behavioural and Cognitive Psychotherapy 30 2002 3 9
-
(2002)
Behavioural and Cognitive Psychotherapy
, vol.30
, pp. 3-9
-
-
Salkovskis, P.M.1
-
42
-
-
0035387175
-
Transforming the weakest link: A human-computer interaction approach to usable and effective security
-
M.A. Sasse, S. Brostoff, and D. Weirich Transforming the weakest link: a human-computer interaction approach to usable and effective security BT Technical Journal 19 3 2001 122 131
-
(2001)
BT Technical Journal
, vol.19
, Issue.3
, pp. 122-131
-
-
Sasse, M.A.1
Brostoff, S.2
Weirich, D.3
-
44
-
-
79958145496
-
Encountering stronger password requirements: User attitudes and behaviors
-
SOUPS10, Redmond, USA
-
Shay, R.; Komanduri, S.; Kelley, P.G.; Leon, P.G.; Mazurek, M.L.; Bauer, L.; Christin, N.; Cranor, L.F.; 2010. Encountering stronger password requirements: user attitudes and behaviors. In: Proceedings of the Symposium on Usable Privacy and Security, SOUPS10, Redmond, USA.
-
(2010)
Proceedings of the Symposium on Usable Privacy and Security
-
-
Shay, R.1
Komanduri, S.2
Kelley, P.G.3
Leon, P.G.4
Mazurek, M.L.5
Bauer, L.6
Christin, N.7
Cranor, L.F.8
-
47
-
-
34249733184
-
Improving password security and memorability to protect personal and organizational information
-
K.L. Vu, R.W. Proctor, A. Bhargav-Spantzel, B. Tai, J. Cook, and E.E. Schultz Improving password security and memorability to protect personal and organizational information International Journal of Human-Computer Studies 65 2007 744 757
-
(2007)
International Journal of Human-Computer Studies
, vol.65
, pp. 744-757
-
-
Vu, K.L.1
Proctor, R.W.2
Bhargav-Spantzel, A.3
Tai, B.4
Cook, J.5
Schultz, E.E.6
-
48
-
-
19944381937
-
PassPoints: Design and longtitudinal evaluation of a graphical password system
-
S. Wiedenbeck, J. Waters, J. Birget, A. Brodskiy, and N. Memon PassPoints: design and longtitudinal evaluation of a graphical password system International Journal of Human-Computer Studies 63 2005 102 127
-
(2005)
International Journal of Human-Computer Studies
, vol.63
, pp. 102-127
-
-
Wiedenbeck, S.1
Waters, J.2
Birget, J.3
Brodskiy, A.4
Memon, N.5
-
49
-
-
77952961608
-
Towards a composite modelling approach for multitasking
-
TAMODIA04, Prague, Czech Republic
-
Wild, P.J.; Johnson, P.; Johnson, H.; 2004. Towards a composite modelling approach for multitasking. In: Proceedings of the Third International Workshop on Task Models and Diagrams for User Interface Design, TAMODIA04, Prague, Czech Republic, pp. 17-24.
-
(2004)
Proceedings of the Third International Workshop on Task Models and Diagrams for User Interface Design
, pp. 17-24
-
-
Wild, P.J.1
Johnson, P.2
Johnson, H.3
-
50
-
-
44349194326
-
Communication-human information processing (C-HIP) model
-
M.S. Wogalter, Lawrence Erlbaum Associates Mahwah, New Jersey
-
M.S. Wogalter Communication-human information processing (C-HIP) model M.S. Wogalter, Handbook of Warnings 2006 Lawrence Erlbaum Associates Mahwah, New Jersey
-
(2006)
Handbook of Warnings
-
-
Wogalter, M.S.1
|