메뉴 건너뛰기




Volumn 70, Issue 6, 2012, Pages 415-431

Rational security: Modelling everyday password use

Author keywords

Password; Rationality; Security; Task modelling

Indexed keywords

ADMINISTRATIVE STAFF; COMPUTER SCIENTISTS; EXTERNAL CONSTRAINTS; PASSWORD; PASSWORD SECURITY; PRIMARY TASK; RATIONALITY; SECURITY; SECURITY OFFICERS; SECURITY POLICY; STUDENT GROUPS; TASK MODELLING; TASK MODELS; USER BEHAVIOUR; USER GROUPS;

EID: 84858182438     PISSN: 10715819     EISSN: 10959300     Source Type: Journal    
DOI: 10.1016/j.ijhcs.2012.02.008     Document Type: Article
Times cited : (40)

References (52)
  • 1
    • 14744275332 scopus 로고    scopus 로고
    • Privacy and rationality in individual decision making
    • A. Acquisti, and J. Grossklags Privacy and rationality in individual decision making IEEE Security and Privacy 3 2005 26 33
    • (2005) IEEE Security and Privacy , vol.3 , pp. 26-33
    • Acquisti, A.1    Grossklags, J.2
  • 4
  • 7
    • 71749099834 scopus 로고    scopus 로고
    • The economics of user effort in information security
    • A. Beautement, and M.A. Sasse The economics of user effort in information security Computer Fraud & Security 10 2009 8 12
    • (2009) Computer Fraud & Security , vol.10 , pp. 8-12
    • Beautement, A.1    Sasse, M.A.2
  • 21
    • 79957818269 scopus 로고    scopus 로고
    • Using and managing multiple passwords: A week to a view
    • B. Grawemeyer, and H. Johnson Using and managing multiple passwords: a week to a view Interacting with Computers 23 2011 256 267
    • (2011) Interacting with Computers , vol.23 , pp. 256-267
    • Grawemeyer, B.1    Johnson, H.2
  • 22
    • 77950877250 scopus 로고    scopus 로고
    • So long and no thanks for the externalities: The rational rejection of security advice by users
    • NSPW09, Oxford, UK
    • Herley, C.; 2009. So long and no thanks for the externalities: the rational rejection of security advice by users. In: Proceedings of the New Security Paradigms Workshop, NSPW09, Oxford, UK.
    • (2009) Proceedings of the New Security Paradigms Workshop
    • Herley, C.1
  • 24
    • 70350440484 scopus 로고    scopus 로고
    • Rational adaptation under task and processing constraints: Implications for testing theories of cognition and action
    • A. Howes, R.L. Lewis, and A. Vera Rational adaptation under task and processing constraints: implications for testing theories of cognition and action Psychological Review 116 4 2009 717 751
    • (2009) Psychological Review , vol.116 , Issue.4 , pp. 717-751
    • Howes, A.1    Lewis, R.L.2    Vera, A.3
  • 28
    • 3042856064 scopus 로고    scopus 로고
    • Towards modeling individual and collaborative construction of jigsaws using task knowledge structures (TKS)
    • H. Johnson, and J. Hyde Towards modeling individual and collaborative construction of jigsaws using task knowledge structures (TKS) ACM Transactions on Computer-Human Interaction 10 2003 339 387
    • (2003) ACM Transactions on Computer-Human Interaction , vol.10 , pp. 339-387
    • Johnson, H.1    Hyde, J.2
  • 29
    • 0024891989 scopus 로고
    • Integrating task analysis into system design surveying designers needs
    • H. Johnson, and P. Johnson Integrating task analysis into system design surveying designers needs Ergonomics 32 1989 1451 1467
    • (1989) Ergonomics , vol.32 , pp. 1451-1467
    • Johnson, H.1    Johnson, P.2
  • 30
    • 0242267471 scopus 로고    scopus 로고
    • A perspective on judgement and choice: Mapping bounded rationality
    • D. Kahneman A perspective on judgement and choice: mapping bounded rationality American Psychologist 58 2003 697 720
    • (2003) American Psychologist , vol.58 , pp. 697-720
    • Kahneman, D.1
  • 35
    • 0001281286 scopus 로고
    • Rational expectations and the theory of price movements
    • J.F. Muth Rational expectations and the theory of price movements Econometrica 29 1961 315 335
    • (1961) Econometrica , vol.29 , pp. 315-335
    • Muth, J.F.1
  • 36
    • 0032651273 scopus 로고    scopus 로고
    • Representations and user-developer interaction in cooperative analysis and design
    • E.J. ONeill, P. Johnson, and H. Johnson Representations and user-developer interaction in cooperative analysis and design Human-Computer Interaction 14 1, 2 1999 43 91
    • (1999) Human-Computer Interaction , vol.14 , Issue.1-2 , pp. 43-91
    • Oneill, E.J.1    Johnson, P.2    Johnson, H.3
  • 38
    • 78751561459 scopus 로고    scopus 로고
    • A stealth approach to usable security: Helping IT security managers to identify workable security solutions
    • NSPW10, Concord, USA
    • Parkin, S.; van Moorsel, A.; Inglesant, P.; Sasse, M.A.; 2010. A stealth approach to usable security: helping IT security managers to identify workable security solutions. In: Proceedings of the New Security Paradigms Workshop, NSPW10, Concord, USA.
    • (2010) Proceedings of the New Security Paradigms Workshop
    • Parkin, S.1    Van Moorsel, A.2    Inglesant, P.3    Sasse, M.A.4
  • 39
    • 34548837727 scopus 로고    scopus 로고
    • Discretionary task interleaving: Heuristics for time allocation in cognitive foraging
    • S.J. Payne, G.B. Duggan, and H. Neth Discretionary task interleaving: heuristics for time allocation in cognitive foraging Journal of Experimental Psychology: General 136 2007 370 388
    • (2007) Journal of Experimental Psychology: General , vol.136 , pp. 370-388
    • Payne, S.J.1    Duggan, G.B.2    Neth, H.3
  • 41
    • 0036168936 scopus 로고    scopus 로고
    • Empirically grounded clinical interventions: Cognitive-behavioural therapy progresses through a multi-dimensional approach to clinical science
    • P.M. Salkovskis Empirically grounded clinical interventions: cognitive-behavioural therapy progresses through a multi-dimensional approach to clinical science Behavioural and Cognitive Psychotherapy 30 2002 3 9
    • (2002) Behavioural and Cognitive Psychotherapy , vol.30 , pp. 3-9
    • Salkovskis, P.M.1
  • 42
    • 0035387175 scopus 로고    scopus 로고
    • Transforming the weakest link: A human-computer interaction approach to usable and effective security
    • M.A. Sasse, S. Brostoff, and D. Weirich Transforming the weakest link: a human-computer interaction approach to usable and effective security BT Technical Journal 19 3 2001 122 131
    • (2001) BT Technical Journal , vol.19 , Issue.3 , pp. 122-131
    • Sasse, M.A.1    Brostoff, S.2    Weirich, D.3
  • 50
    • 44349194326 scopus 로고    scopus 로고
    • Communication-human information processing (C-HIP) model
    • M.S. Wogalter, Lawrence Erlbaum Associates Mahwah, New Jersey
    • M.S. Wogalter Communication-human information processing (C-HIP) model M.S. Wogalter, Handbook of Warnings 2006 Lawrence Erlbaum Associates Mahwah, New Jersey
    • (2006) Handbook of Warnings
    • Wogalter, M.S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.