메뉴 건너뛰기




Volumn , Issue , 2011, Pages

A brick wall, a locked door, and a bandit: A physical security metaphor for firewall warnings

Author keywords

mental model; personal firewall; physical security metaphor; usable security; warning

Indexed keywords

MENTAL MODEL; PERSONAL FIREWALLS; PHYSICAL SECURITY; USABLE SECURITY; WARNING;

EID: 84862937206     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2078827.2078829     Document Type: Conference Paper
Times cited : (51)

References (49)
  • 3
    • 0028004107 scopus 로고
    • Designing risk communications: Completing and correcting mental models of hazardous processes, part I
    • DOI 10.1111/j.1539-6924.1994.tb00289.x
    • C. J. Atman, A. Bostrom, B. Fischhoff, and M. G. Morgan. Designing risk communications: Completing and correcting mental models of hazardous processes, part i. Risk Analysis, 14(5):779-788, 1994. (Pubitemid 24362988)
    • (1994) Risk Analysis , vol.14 , Issue.5 , pp. 779-788
    • Atman, C.J.1    Bostrom, A.2    Fischhoff, B.3    Morgan, M.G.4
  • 4
    • 34948838524 scopus 로고    scopus 로고
    • ZoneAlarm: Creating usable security products for consumers
    • L. F. Cranor and S. Garfinkel, editors, chapter 27, O'Reilly Media, Inc.
    • J. Berson. ZoneAlarm: Creating usable security products for consumers. In L. F. Cranor and S. Garfinkel, editors, Security and Usability: Designing Secure Systems that People Can Use, chapter 27, pages 563-575. O'Reilly Media, Inc., 2005.
    • (2005) Security and Usability: Designing Secure Systems That People Can Use , pp. 563-575
    • Berson, J.1
  • 6
    • 0028089810 scopus 로고
    • Evaluating risk communications: Completing and correcting mental models of hazardous processes, part II
    • DOI 10.1111/j.1539-6924.1994.tb00290.x
    • A. Bostrom, C. J. Atman, B. Fischhoff, and M. G. Morgan. Evaluating risk communications: Completing and correcting mental models of hazardous processes, part ii. Risk Analysis, 14(5):789-798, 1994. (Pubitemid 24362989)
    • (1994) Risk Analysis , vol.14 , Issue.5 , pp. 789-798
    • Bostrom, A.1    Atman, C.J.2    Fischhoff, B.3    Morgan, M.G.4
  • 8
    • 77956256623 scopus 로고    scopus 로고
    • Experimental Evaluations of Expert and Non-expert Computer Users? Mental Models of Security Risks
    • L. Camp, F. Asgharpour, D. Liu, and I. Bloomington. Experimental Evaluations of Expert and Non-expert Computer Users? Mental Models of Security Risks. Proceedings of WEIS 2007, 2007.
    • (2007) Proceedings of WEIS 2007
    • Camp, L.1    Asgharpour, F.2    Liu, D.3    Bloomington, I.4
  • 9
    • 0037660038 scopus 로고    scopus 로고
    • Conceptual design reconsidered: The case of the internet session directory tool
    • London, UK, Springer-Verlag
    • L. Clark and M. A. Sasse. Conceptual design reconsidered: The case of the internet session directory tool. In Proceedings of HCI on People and Computers XII, HCI 97, pages 67-84, London, UK, 1997. Springer-Verlag.
    • (1997) Proceedings of HCI on People and Computers XII, HCI 97 , pp. 67-84
    • Clark, L.1    Sasse, M.A.2
  • 12
    • 33745807143 scopus 로고    scopus 로고
    • Social navigation as a model for usable security
    • Pittsburgh, Pennsylvania, ACM
    • P. DiGioia and P. Dourish. Social navigation as a model for usable security. In SOUPS '05, pages 101-108, Pittsburgh, Pennsylvania, 2005. ACM.
    • (2005) SOUPS '05 , pp. 101-108
    • DiGioia, P.1    Dourish, P.2
  • 17
    • 20744447916 scopus 로고    scopus 로고
    • Perceptions of end-users on the requirements in personal firewall software: An exploratory study
    • S. Hazari. Perceptions of end-users on the requirements in personal firewall software: An exploratory study. The Journal of Supercomputing, 17(3):47-56, 2005.
    • (2005) The Journal of Supercomputing , vol.17 , Issue.3 , pp. 47-56
    • Hazari, S.1
  • 21
    • 0023912965 scopus 로고
    • Mental models in risk assessment: Informing people about drugs
    • H. Jungermann, H. Schutz, and M. Thuring. Mental models in risk assessment: Informing people about drugs. Risk Analysis, 8(1):147-155, 1988.
    • (1988) Risk Analysis , vol.8 , Issue.1 , pp. 147-155
    • Jungermann, H.1    Schutz, H.2    Thuring, M.3
  • 23
    • 84862944044 scopus 로고    scopus 로고
    • Risk Communication in Security Using Mental Models
    • D. Liu, F. Asgharpour, and L. Camp. Risk Communication in Security Using Mental Models. Usable Security, 7, 2008.
    • (2008) Usable Security , pp. 7
    • Liu, D.1    Asgharpour, F.2    Camp, L.3
  • 26
    • 80052803379 scopus 로고    scopus 로고
    • Do windows users follow the principle of least privilege? investigating user account control practices
    • New York, NY, USA, July 14-16 ACM
    • S. Motiee, K. Hawkey, and K. Beznosov. Do windows users follow the principle of least privilege? investigating user account control practices. In Proceedings of the 5th Symposium on Usable Privacy and Security (SOUPS), pages 1-13, New York, NY, USA, July 14-16 2010. ACM.
    • (2010) Proceedings of the 5th Symposium on Usable Privacy and Security (SOUPS) , pp. 1-13
    • Motiee, S.1    Hawkey, K.2    Beznosov, K.3
  • 28
    • 57849098926 scopus 로고    scopus 로고
    • Users and trust: A microsoft case study
    • C. Nodder. Users and trust: A microsoft case study. Security and Usability, pages 589-606, 2005.
    • (2005) Security and Usability , pp. 589-606
    • Nodder, C.1
  • 29
    • 0012986449 scopus 로고
    • Lawrence Erlbaum Associates, Hillsdale, NJ
    • D. A. Norman. Cognitive Engineering. Lawrence Erlbaum Associates, Hillsdale, NJ, 1986.
    • (1986) Cognitive Engineering
    • Norman, D.A.1
  • 32
    • 84862953884 scopus 로고    scopus 로고
    • Popular in firewalls. http://www.pcworld.com/downloads/file/fid,63762- order,4/description.html, 2010.
    • (2010) Popular in Firewalls
  • 35
    • 0001267727 scopus 로고    scopus 로고
    • Three generations of environment and security research
    • C. Ronnfeldt. Three generations of environment and security research. Journal of Peace Research, 34(4):473-482, 1997. (Pubitemid 127345296)
    • (1997) Journal of Peace Research , vol.34 , Issue.4 , pp. 473-482
    • Ronnfeldt, C.F.1
  • 39
    • 11144338913 scopus 로고
    • Intended and unintended consequences of warning messages: A review and synthesis of empirical research
    • D. W. Stewart and I. M. Martin. Intended and unintended consequences of warning messages: A review and synthesis of empirical research. Journal of Public Policy and Marketing, 13(1):1-19, 1994.
    • (1994) Journal of Public Policy and Marketing , vol.13 , Issue.1 , pp. 1-19
    • Stewart, D.W.1    Martin, I.M.2
  • 44
    • 84862925676 scopus 로고    scopus 로고
    • Explore the features: Windows security center
    • Explore the features: Windows security center. http://www.microsoft.com/ windows/windows-vista/features/security-center.aspx, 2010.
    • (2010)
  • 45
    • 0036017210 scopus 로고    scopus 로고
    • Research-based guidelines for warning design and evaluation
    • DOI 10.1016/S0003-6870(02)00009-1, PII S0003687002000091
    • M. Wogalter, V. Conzola, and T. Smith-Jackson. Research-based guidelines for warning design and evaluation. Applied Ergonomics, 33(3):219-230, 2002. (Pubitemid 34626543)
    • (2002) Applied Ergonomics , vol.33 , Issue.3 , pp. 219-230
    • Wogalter, M.S.1    Conzola, V.C.2    Smith-Jackson, T.L.3
  • 48
    • 2142742286 scopus 로고    scopus 로고
    • Intermediate processing stages: Methodological considerations for research on warnings
    • S. Young and D. Lovvoll. Intermediate processing stages: Methodological considerations for research on warnings. Warnings and risk communication, pages 27-52, 1999.
    • (1999) Warnings and Risk Communication , pp. 27-52
    • Young, S.1    Lovvoll, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.