-
1
-
-
0011101935
-
Minimising conceptual baggage: Making choices about metaphor
-
B. Anderson, M. Smyth, R. Knott, M. Bergan, J. Bergan, and J. Alty. Minimising conceptual baggage: Making choices about metaphor. In People and Computers IX - Proceedings of HCI'94, pages 179-194, 1994.
-
(1994)
People and Computers IX - Proceedings of HCI'94
, pp. 179-194
-
-
Anderson, B.1
Smyth, M.2
Knott, R.3
Bergan, M.4
Bergan, J.5
Alty, J.6
-
2
-
-
38549175577
-
Mental models of security risks
-
Berlin, Heidelberg, Springer-Verlag
-
F. Asgharpour, D. Liu, and L. J. Camp. Mental models of security risks. In FC'07/USEC'07: Proceedings of the 11th International Conference on Financial Cryptography and 1st International Conference on Usable Security, pages 367-377, Berlin, Heidelberg, 2007. Springer-Verlag.
-
(2007)
FC'07/USEC'07: Proceedings of the 11th International Conference on Financial Cryptography and 1st International Conference on Usable Security
, pp. 367-377
-
-
Asgharpour, F.1
Liu, D.2
Camp, L.J.3
-
3
-
-
0028004107
-
Designing risk communications: Completing and correcting mental models of hazardous processes, part I
-
DOI 10.1111/j.1539-6924.1994.tb00289.x
-
C. J. Atman, A. Bostrom, B. Fischhoff, and M. G. Morgan. Designing risk communications: Completing and correcting mental models of hazardous processes, part i. Risk Analysis, 14(5):779-788, 1994. (Pubitemid 24362988)
-
(1994)
Risk Analysis
, vol.14
, Issue.5
, pp. 779-788
-
-
Atman, C.J.1
Bostrom, A.2
Fischhoff, B.3
Morgan, M.G.4
-
4
-
-
34948838524
-
ZoneAlarm: Creating usable security products for consumers
-
L. F. Cranor and S. Garfinkel, editors, chapter 27, O'Reilly Media, Inc.
-
J. Berson. ZoneAlarm: Creating usable security products for consumers. In L. F. Cranor and S. Garfinkel, editors, Security and Usability: Designing Secure Systems that People Can Use, chapter 27, pages 563-575. O'Reilly Media, Inc., 2005.
-
(2005)
Security and Usability: Designing Secure Systems That People Can Use
, pp. 563-575
-
-
Berson, J.1
-
5
-
-
84855707459
-
The impact of social navigation on privacy policy configuration
-
New York, NY, USA, ACM
-
A. Besmer, J. Watson, and H. R. Lipford. The impact of social navigation on privacy policy configuration. In SOUPS '10: Proceedings of the Sixth Symposium on Usable Privacy and Security, pages 1-10, New York, NY, USA, 2010. ACM.
-
(2010)
SOUPS '10: Proceedings of the Sixth Symposium on Usable Privacy and Security
, pp. 1-10
-
-
Besmer, A.1
Watson, J.2
Lipford, H.R.3
-
6
-
-
0028089810
-
Evaluating risk communications: Completing and correcting mental models of hazardous processes, part II
-
DOI 10.1111/j.1539-6924.1994.tb00290.x
-
A. Bostrom, C. J. Atman, B. Fischhoff, and M. G. Morgan. Evaluating risk communications: Completing and correcting mental models of hazardous processes, part ii. Risk Analysis, 14(5):789-798, 1994. (Pubitemid 24362989)
-
(1994)
Risk Analysis
, vol.14
, Issue.5
, pp. 789-798
-
-
Bostrom, A.1
Atman, C.J.2
Fischhoff, B.3
Morgan, M.G.4
-
7
-
-
84862935559
-
-
Poster: What is still wrong with security warnings: a mental models approach. ACM
-
C. Bravo-Lillo, L. Cranor, J. Downs, and S. Komanduri. Poster: What is still wrong with security warnings: a mental models approach. In SOUPS '10: Proceedings of the 6th Symposium on Usable Privacy and Security, New York, NY, USA, 2010. ACM.
-
SOUPS '10: Proceedings of the 6th Symposium on Usable Privacy and Security, New York, NY, USA, 2010
-
-
Bravo-Lillo, C.1
Cranor, L.2
Downs, J.3
Komanduri, S.4
-
8
-
-
77956256623
-
Experimental Evaluations of Expert and Non-expert Computer Users? Mental Models of Security Risks
-
L. Camp, F. Asgharpour, D. Liu, and I. Bloomington. Experimental Evaluations of Expert and Non-expert Computer Users? Mental Models of Security Risks. Proceedings of WEIS 2007, 2007.
-
(2007)
Proceedings of WEIS 2007
-
-
Camp, L.1
Asgharpour, F.2
Liu, D.3
Bloomington, I.4
-
9
-
-
0037660038
-
Conceptual design reconsidered: The case of the internet session directory tool
-
London, UK, Springer-Verlag
-
L. Clark and M. A. Sasse. Conceptual design reconsidered: The case of the internet session directory tool. In Proceedings of HCI on People and Computers XII, HCI 97, pages 67-84, London, UK, 1997. Springer-Verlag.
-
(1997)
Proceedings of HCI on People and Computers XII, HCI 97
, pp. 67-84
-
-
Clark, L.1
Sasse, M.A.2
-
11
-
-
84893108843
-
A framework for reasoning about the human in the loop
-
Berkeley, CA, USA, USENIX Association
-
L. F. Cranor. A framework for reasoning about the human in the loop. In UPSEC'08: Proceedings of the 1st Conference on Usability, Psychology, and Security, pages 1-15, Berkeley, CA, USA, 2008. USENIX Association.
-
(2008)
UPSEC'08: Proceedings of the 1st Conference on Usability, Psychology, and Security
, pp. 1-15
-
-
Cranor, L.F.1
-
12
-
-
33745807143
-
Social navigation as a model for usable security
-
Pittsburgh, Pennsylvania, ACM
-
P. DiGioia and P. Dourish. Social navigation as a model for usable security. In SOUPS '05, pages 101-108, Pittsburgh, Pennsylvania, 2005. ACM.
-
(2005)
SOUPS '05
, pp. 101-108
-
-
DiGioia, P.1
Dourish, P.2
-
13
-
-
34250737359
-
Decision strategies and susceptibility to phishing
-
New York, NY, USA, ACM
-
J. S. Downs, M. B. Holbrook, and L. F. Cranor. Decision strategies and susceptibility to phishing. In SOUPS '06: Proceedings of the Second Symposium on Usable Privacy and Security, pages 79-90, New York, NY, USA, 2006. ACM.
-
(2006)
SOUPS '06: Proceedings of the Second Symposium on Usable Privacy and Security
, pp. 79-90
-
-
Downs, J.S.1
Holbrook, M.B.2
Cranor, L.F.3
-
14
-
-
57649166927
-
You've been warned: An empirical study of the effectiveness of web browser phishing warnings
-
New York, NY, USA, ACM
-
S. Egelman, L. F. Cranor, and J. Hong. You've been warned: an empirical study of the effectiveness of web browser phishing warnings. In CHI '08: Proceedings of the SIGCHI Conference on Human factors in Computing Systems, pages 1065-1074, New York, NY, USA, 2008. ACM.
-
(2008)
CHI '08: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
, pp. 1065-1074
-
-
Egelman, S.1
Cranor, L.F.2
Hong, J.3
-
15
-
-
35348898406
-
Security user studies: Methodologies and best practices
-
DOI 10.1145/1240866.1241089, SIGCHI Conference on Human Factors in Computing Systems 2007, CHI 2007 Extended Abstracts
-
S. Egelman, J. King, R. C. Miller, N. Ragouzis, and E. Shehan. Security user studies: methodologies and best practices. In CHI Extended Abstracts, pages 2833-2836. ACM, 2007. (Pubitemid 47581962)
-
(2007)
Conference on Human Factors in Computing Systems - Proceedings
, pp. 2833-2836
-
-
Egelman, S.1
King, J.2
Miller, R.C.3
Ragouzis, N.4
Shehan, E.5
-
17
-
-
20744447916
-
Perceptions of end-users on the requirements in personal firewall software: An exploratory study
-
S. Hazari. Perceptions of end-users on the requirements in personal firewall software: An exploratory study. The Journal of Supercomputing, 17(3):47-56, 2005.
-
(2005)
The Journal of Supercomputing
, vol.17
, Issue.3
, pp. 47-56
-
-
Hazari, S.1
-
21
-
-
0023912965
-
Mental models in risk assessment: Informing people about drugs
-
H. Jungermann, H. Schutz, and M. Thuring. Mental models in risk assessment: Informing people about drugs. Risk Analysis, 8(1):147-155, 1988.
-
(1988)
Risk Analysis
, vol.8
, Issue.1
, pp. 147-155
-
-
Jungermann, H.1
Schutz, H.2
Thuring, M.3
-
23
-
-
84862944044
-
Risk Communication in Security Using Mental Models
-
D. Liu, F. Asgharpour, and L. Camp. Risk Communication in Security Using Mental Models. Usable Security, 7, 2008.
-
(2008)
Usable Security
, pp. 7
-
-
Liu, D.1
Asgharpour, F.2
Camp, L.3
-
26
-
-
80052803379
-
Do windows users follow the principle of least privilege? investigating user account control practices
-
New York, NY, USA, July 14-16 ACM
-
S. Motiee, K. Hawkey, and K. Beznosov. Do windows users follow the principle of least privilege? investigating user account control practices. In Proceedings of the 5th Symposium on Usable Privacy and Security (SOUPS), pages 1-13, New York, NY, USA, July 14-16 2010. ACM.
-
(2010)
Proceedings of the 5th Symposium on Usable Privacy and Security (SOUPS)
, pp. 1-13
-
-
Motiee, S.1
Hawkey, K.2
Beznosov, K.3
-
28
-
-
57849098926
-
Users and trust: A microsoft case study
-
C. Nodder. Users and trust: A microsoft case study. Security and Usability, pages 589-606, 2005.
-
(2005)
Security and Usability
, pp. 589-606
-
-
Nodder, C.1
-
29
-
-
0012986449
-
-
Lawrence Erlbaum Associates, Hillsdale, NJ
-
D. A. Norman. Cognitive Engineering. Lawrence Erlbaum Associates, Hillsdale, NJ, 1986.
-
(1986)
Cognitive Engineering
-
-
Norman, D.A.1
-
32
-
-
84862953884
-
-
Popular in firewalls. http://www.pcworld.com/downloads/file/fid,63762- order,4/description.html, 2010.
-
(2010)
Popular in Firewalls
-
-
-
33
-
-
70350733771
-
Revealing hidden context: Improving mental models of personal firewall users
-
New York, NY, USA, ACM
-
F. Raja, K. Hawkey, and K. Beznosov. Revealing hidden context: improving mental models of personal firewall users. In SOUPS '09: Proceedings of the 5th Symposium on Usable Privacy and Security, pages 1-12, New York, NY, USA, 2009. ACM.
-
(2009)
SOUPS '09: Proceedings of the 5th Symposium on Usable Privacy and Security
, pp. 1-12
-
-
Raja, F.1
Hawkey, K.2
Beznosov, K.3
-
34
-
-
78650116009
-
It's Too Complicated, so I Turned It Off! Expectations, Perceptions, and Misconceptions of Personal Firewalls
-
F. Raja, K. Hawkey, P. Jaferian, K. Beznosov, and K. S. Booth. It's Too Complicated, So I Turned It Off! Expectations, Perceptions, and Misconceptions of Personal Firewalls. In Proceedings of the 3rd ACM Workshop on Assurable & Usable Security Configuration (SafeConfig), October 4 2010.
-
Proceedings of the 3rd ACM Workshop on Assurable & Usable Security Configuration (SafeConfig), October 4 2010
-
-
Raja, F.1
Hawkey, K.2
Jaferian, P.3
Beznosov, K.4
Booth, K.S.5
-
35
-
-
0001267727
-
Three generations of environment and security research
-
C. Ronnfeldt. Three generations of environment and security research. Journal of Peace Research, 34(4):473-482, 1997. (Pubitemid 127345296)
-
(1997)
Journal of Peace Research
, vol.34
, Issue.4
, pp. 473-482
-
-
Ronnfeldt, C.F.1
-
36
-
-
34548786769
-
The emperor's new security indicators
-
Washington, DC, USA, IEEE Computer Society
-
S. E. Schechter, R. Dhamija, A. Ozment, and I. Fischer. The emperor's new security indicators. In Proceedings of the 2007 IEEE Symposium on Security and Privacy, pages 51-65, Washington, DC, USA, 2007. IEEE Computer Society.
-
(2007)
Proceedings of the 2007 IEEE Symposium on Security and Privacy
, pp. 51-65
-
-
Schechter, S.E.1
Dhamija, R.2
Ozment, A.3
Fischer, I.4
-
39
-
-
11144338913
-
Intended and unintended consequences of warning messages: A review and synthesis of empirical research
-
D. W. Stewart and I. M. Martin. Intended and unintended consequences of warning messages: A review and synthesis of empirical research. Journal of Public Policy and Marketing, 13(1):1-19, 1994.
-
(1994)
Journal of Public Policy and Marketing
, vol.13
, Issue.1
, pp. 1-19
-
-
Stewart, D.W.1
Martin, I.M.2
-
40
-
-
57649180971
-
Sesame: Informing user security decisions with system visualization
-
New York, NY, USA, ACM
-
J. Stoll, C. S. Tashman, W. K. Edwards, and K. Spafford. Sesame: informing user security decisions with system visualization. In CHI '08: Proceeding of the Twenty-Sixth Annual SIGCHI Conference on Human factors in Computing Systems, pages 1045-1054, New York, NY, USA, 2008. ACM.
-
(2008)
CHI '08: Proceeding of the Twenty-Sixth Annual SIGCHI Conference on Human Factors in Computing Systems
, pp. 1045-1054
-
-
Stoll, J.1
Tashman, C.S.2
Edwards, W.K.3
Spafford, K.4
-
41
-
-
84926351578
-
Crying Wolf: An empirical study of SSL warning effectiveness
-
J. Sunshine, S. Egelman, H. Almuhimedi, N. Atri, and L. F. Cranor. Crying Wolf: An empirical study of SSL warning effectiveness. In Proceedings of 18th USENIX Security Symposium, pages 399-432, 2009.
-
(2009)
Proceedings of 18th USENIX Security Symposium
, pp. 399-432
-
-
Sunshine, J.1
Egelman, S.2
Almuhimedi, H.3
Atri, N.4
Cranor, L.F.5
-
43
-
-
79951633637
-
Folk models of home computer security
-
New York, NY, USA, ACM
-
R. Wash. Folk models of home computer security. In Proceedings of the Sixth Symposium on Usable Privacy and Security, SOUPS '10, pages 11:1-11:16, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the Sixth Symposium on Usable Privacy and Security, SOUPS '10
-
-
Wash, R.1
-
44
-
-
84862925676
-
-
Explore the features: Windows security center
-
Explore the features: Windows security center. http://www.microsoft.com/ windows/windows-vista/features/security-center.aspx, 2010.
-
(2010)
-
-
-
45
-
-
0036017210
-
Research-based guidelines for warning design and evaluation
-
DOI 10.1016/S0003-6870(02)00009-1, PII S0003687002000091
-
M. Wogalter, V. Conzola, and T. Smith-Jackson. Research-based guidelines for warning design and evaluation. Applied Ergonomics, 33(3):219-230, 2002. (Pubitemid 34626543)
-
(2002)
Applied Ergonomics
, vol.33
, Issue.3
, pp. 219-230
-
-
Wogalter, M.S.1
Conzola, V.C.2
Smith-Jackson, T.L.3
-
47
-
-
33745867321
-
Do security toolbars actually prevent phishing attacks?
-
New York, NY, USA, ACM
-
M. Wu, R. C. Miller, and S. L. Garfinkel. Do security toolbars actually prevent phishing attacks? In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems(CHI '06), pages 601-610, New York, NY, USA, 2006. ACM.
-
(2006)
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems(CHI '06)
, pp. 601-610
-
-
Wu, M.1
Miller, R.C.2
Garfinkel, S.L.3
-
48
-
-
2142742286
-
Intermediate processing stages: Methodological considerations for research on warnings
-
S. Young and D. Lovvoll. Intermediate processing stages: Methodological considerations for research on warnings. Warnings and risk communication, pages 27-52, 1999.
-
(1999)
Warnings and Risk Communication
, pp. 27-52
-
-
Young, S.1
Lovvoll, D.2
-
49
-
-
84948973276
-
Did you ever have to make up your mind? what notes users do when faced with a security decision
-
Washington, DC, USA, IEEE Computer Society
-
M. E. Zurko, C. Kaufman, K. Spanbauer, and C. Bassett. Did you ever have to make up your mind? what notes users do when faced with a security decision. In ACSAC '02: Proceedings of the 18th Annual Computer Security Applications Conference, pages 371-381, Washington, DC, USA, 2002. IEEE Computer Society.
-
(2002)
ACSAC '02: Proceedings of the 18th Annual Computer Security Applications Conference
, pp. 371-381
-
-
Zurko, M.E.1
Kaufman, C.2
Spanbauer, K.3
Bassett, C.4
|