-
3
-
-
80053156184
-
-
Detica and Office of Cyber Security and Information Assurance in the Cabinet Office UK
-
Detica and Office of Cyber Security and Information Assurance in the Cabinet Office UK, "The cost of cyber crime," 2011.
-
(2011)
The Cost of Cyber Crime
-
-
-
4
-
-
0035387175
-
Transforming the 'weakest link' - A human/computer interaction approach to usable and effective security
-
DOI 10.1023/A:1011902718709
-
M. Sasse, S. Brostoff, and D. Weirich, "Transforming the 'weakest link' - a human/computer interaction approach to usable and effective security," BT Technology Journal, vol. 19, no. 3, pp. 122-131, 2001. (Pubitemid 32903117)
-
(2001)
BT Technology Journal
, vol.19
, Issue.3
, pp. 122-131
-
-
Sasse, M.A.1
Brostoff, S.2
Weirich, D.3
-
5
-
-
3042740017
-
Humans in the loop: Human-computer interaction and security
-
S. Smith, "Humans in the loop: Human-computer interaction and security," IEEE Security & Privacy, vol. 1, no. 3, pp. 75-79, 2003.
-
(2003)
IEEE Security & Privacy
, vol.1
, Issue.3
, pp. 75-79
-
-
Smith, S.1
-
6
-
-
12844272841
-
In search of usable security: Five lessons from the field
-
DOI 10.1109/MSP.2004.71
-
D. Balfanz, G. Durfee, D. Smetters, and R. Grinter, "In search of usable security: Five lessons from the field," Security & Privacy, IEEE, vol. 2, no. 5, pp. 19-24, 2004. (Pubitemid 40168622)
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.5
, pp. 19-24
-
-
Balfanz, D.1
Durfee, G.2
Smetters, D.K.3
Grinter, R.E.4
-
7
-
-
44449091000
-
A brief introduction to usable security
-
B. Payne and W. Edwards, "A brief introduction to usable security," IEEE Internet Computing, pp. 13-21, 2008.
-
(2008)
IEEE Internet Computing
, pp. 13-21
-
-
Payne, B.1
Edwards, W.2
-
8
-
-
78751561459
-
A stealth approach to usable security: Helping it security managers to identify workable security solutions
-
ACM
-
S. Parkin, A. van Moorsel, P. Inglesant, and M. Sasse, "A stealth approach to usable security: helping it security managers to identify workable security solutions," in The New Security Paradigms Workshop (NSPW) 2010. ACM, 2010, pp. 33-50.
-
(2010)
The New Security Paradigms Workshop (NSPW) 2010
, pp. 33-50
-
-
Parkin, S.1
Van Moorsel, A.2
Inglesant, P.3
Sasse, M.4
-
9
-
-
77952351869
-
Security and usability: Analysis and evaluation
-
IEEE
-
R. Kainda, I. Flechais, and A. Roscoe, "Security and usability: Analysis and evaluation," in International Conference on Availability, Reliability and Security (ARES). IEEE, 2010, pp. 275-282.
-
(2010)
International Conference on Availability, Reliability and Security (ARES)
, pp. 275-282
-
-
Kainda, R.1
Flechais, I.2
Roscoe, A.3
-
10
-
-
34948822955
-
How well are information risks being communicated to your computer end-users?
-
DOI 10.1108/09685220710831107, Selected Papers from the HAISA 2007 Symposium
-
M. Pattinson and G. Anderson, "How well are information risks being communicated to your computer end-users?" Information Management & Computer Security, vol. 15, no. 5, pp. 362-371, 2007. (Pubitemid 47527421)
-
(2007)
Information Management and Computer Security
, vol.15
, Issue.5
, pp. 362-371
-
-
Pattinson, M.R.1
Anderson, G.2
-
11
-
-
77955612722
-
Can cognitive science help us make online risk more tangible?
-
S. Creese and K. Lamberts, "Can cognitive science help us make online risk more tangible?" IEEE Intelligent Systems, vol. 24, no. 6, pp. 32-36, 2009.
-
(2009)
IEEE Intelligent Systems
, vol.24
, Issue.6
, pp. 32-36
-
-
Creese, S.1
Lamberts, K.2
-
12
-
-
70749162072
-
Risk perceptions of information security: A measurement study
-
IEEE Computer Society
-
F. Farahmand, M. Dark, S. Liles, and B. Sorge, "Risk perceptions of information security: A measurement study," in International Conference on Computational Science and Engineering. IEEE Computer Society, 2009, pp. 462-469.
-
(2009)
International Conference on Computational Science and Engineering
, pp. 462-469
-
-
Farahmand, F.1
Dark, M.2
Liles, S.3
Sorge, B.4
-
13
-
-
79952752359
-
Targeted risk communication for computer security
-
J. Blythe, J. Camp, and V. Garg, "Targeted risk communication for computer security," in 15th International Conference on Intelligent User Interfaces, 2011, pp. 295-298.
-
(2011)
15th International Conference on Intelligent User Interfaces
, pp. 295-298
-
-
Blythe, J.1
Camp, J.2
Garg, V.3
-
14
-
-
70350230128
-
Mental models of privacy and security
-
L. J. Camp, "Mental models of privacy and security," IEEE Technology and Society Magazine, vol. 28, no. 3, pp. 37-46, 2009.
-
(2009)
IEEE Technology and Society Magazine
, vol.28
, Issue.3
, pp. 37-46
-
-
Camp, L.J.1
-
15
-
-
39649092733
-
Trust in digital information
-
DOI 10.1002/asi.20722
-
K. Kelton, K. R. Fleischmann, and W. A. Wallace, "Trust in digital information," Journal of the American Society for Information Science and Technology, vol. 59, no. 3, pp. 363-374, 2008. (Pubitemid 351288080)
-
(2008)
Journal of the American Society for Information Science and Technology
, vol.59
, Issue.3
, pp. 363-374
-
-
Kelton, K.1
Fleischmann, K.R.2
Wallace, W.A.3
-
16
-
-
84871965017
-
Information quality and trustworthiness: A topical state-of-the-art review
-
IEEE Press
-
J. R. C. Nurse, S. S. Rahman, S. Creese, M. Goldsmith, and K. Lamberts, "Information quality and trustworthiness: A topical state-of-the-art review," in International Conference on Computer Applications and Network Security (ICCANS). IEEE Press, 2011, pp. 492-500.
-
(2011)
International Conference on Computer Applications and Network Security (ICCANS)
, pp. 492-500
-
-
Nurse, J.R.C.1
Rahman, S.S.2
Creese, S.3
Goldsmith, M.4
Lamberts, K.5
-
17
-
-
36549050469
-
Towards content trust of web resources
-
DOI 10.1016/j.websem.2007.09.005, PII S1570826807000376, World Widw Web Conference 2006 Semantic Web Track
-
Y. Gil and D. Artz, "Towards content trust of web resources," Journal of Web Semantics: Science, Services and Agents on the World Wide Web, vol. 5, no. 4, pp. 227-239, 2007. (Pubitemid 350180647)
-
(2007)
Web Semantics
, vol.5
, Issue.4
, pp. 227-239
-
-
Gil, Y.1
Artz, D.2
-
18
-
-
78650861073
-
Trust in 'E': Users' trust in information resources in the web environment
-
J. E. Quintela Varajo, Ed.
-
A. J. Pickard, P. Gannon-Leary, and L. Coventry, "Trust in 'E': Users' trust in information resources in the web environment," in ENTERprise Information Systems, ser. Communications in Computer and Information Science, J. E. Quintela Varajo, Ed., 2010, vol. 110, pp. 305-314.
-
(2010)
ENTERprise Information Systems, Ser. Communications in Computer and Information Science
, vol.110
, pp. 305-314
-
-
Pickard, A.J.1
Gannon-Leary, P.2
Coventry, L.3
-
19
-
-
84880945668
-
Quantifying the trustworthiness of social media content
-
S. Moturu and H. Liu, "Quantifying the trustworthiness of social media content," Distributed and Parallel Databases, pp. 1-22, 2010.
-
(2010)
Distributed and Parallel Databases
, pp. 1-22
-
-
Moturu, S.1
Liu, H.2
-
20
-
-
0004239573
-
-
National Research Council (NRC) USA National Academy of Sciences
-
National Research Council (NRC) USA, Improving Risk Communication. National Academy of Sciences, 1989. [Online]. Available: http://www.nap.edu/ openbook.php?record-id=1189
-
(1989)
Improving Risk Communication
-
-
-
21
-
-
0035185201
-
The language of risk: A question of trust
-
DOI 10.1046/j.1537-2995.2001.41111326.x
-
K. Calman, "The language of risk: a question of trust," Transfusion, vol. 41, no. 11, pp. 1326-1328, 2001. (Pubitemid 33104216)
-
(2001)
Transfusion
, vol.41
, Issue.11
, pp. 1326-1328
-
-
Calman, K.C.1
-
22
-
-
0035190787
-
The william pickles lecture. Issues of risk:'This unique opportunity'
-
-, "The William Pickles Lecture. Issues of risk:'this unique opportunity'," The British Journal of General Practice, vol. 51, no. 462, pp. 47-51, 2001.
-
(2001)
The British Journal of General Practice
, vol.51
, Issue.462
, pp. 47-51
-
-
Calman, K.1
-
24
-
-
0010111851
-
The evaluation of risk communication effectiveness
-
B. Rohrmann, "The evaluation of risk communication effectiveness," Acta psychologica, vol. 81, no. 2, pp. 169-192, 1992.
-
(1992)
Acta Psychologica
, vol.81
, Issue.2
, pp. 169-192
-
-
Rohrmann, B.1
-
25
-
-
84923684902
-
Risk perception, risk attitude, risk communication, risk management: A conceptual appraisal
-
-, "Risk perception, risk attitude, risk communication, risk management: a conceptual appraisal," in 15th Internaional Emergency Management Society (TIEMS) Annual Conference, 2008.
-
(2008)
15th Internaional Emergency Management Society (TIEMS) Annual Conference
-
-
Rohrmann, B.1
-
26
-
-
0027254070
-
Risk perception and communication
-
B. Fischhoff, A. Bostrom, and M. Quadrel, "Risk perception and communication," Annual Review of Public Health, vol. 14, no. 1, pp. 183-203, 1993. (Pubitemid 23161717)
-
(1993)
Annual Review of Public Health
, vol.14
, pp. 183-203
-
-
Fischhoff, B.1
Bostrom, A.2
Quadrel, M.J.3
-
27
-
-
0033178111
-
Trust, emotion, sex, politics, and science: Surveying the risk-assessment battlefield
-
P. Slovic, "Trust, emotion, sex, politics, and science: Surveying the risk-assessment battlefield," Risk analysis, vol. 19, no. 4, pp. 689-701, 1999.
-
(1999)
Risk Analysis
, vol.19
, Issue.4
, pp. 689-701
-
-
Slovic, P.1
-
28
-
-
33644534820
-
A heuristics approach to understanding cancer risk perception: Contributions from judgment and decision-making research
-
E. Peters, K. McCaul, M. Stefanek, and W. Nelson, "A heuristics approach to understanding cancer risk perception: contributions from judgment and decision-making research," Annals of Behavioral Medicine, vol. 31, no. 1, pp. 45-52, 2006.
-
(2006)
Annals of Behavioral Medicine
, vol.31
, Issue.1
, pp. 45-52
-
-
Peters, E.1
McCaul, K.2
Stefanek, M.3
Nelson, W.4
-
29
-
-
34250731104
-
Risk perception and terrorism: Applying the psychometric paradigm
-
C. Jenkin, "Risk perception and terrorism: Applying the psychometric paradigm," Homeland Security Affairs, vol. 2, no. 2, pp. 1-14, 2006.
-
(2006)
Homeland Security Affairs
, vol.2
, Issue.2
, pp. 1-14
-
-
Jenkin, C.1
-
31
-
-
0023324565
-
Perception of risk
-
P. Slovic, "Perception of risk," Science, vol. 236, no. 4799, pp. 280-285, 1987. (Pubitemid 17061043)
-
(1987)
Science
, vol.236
, Issue.4799
, pp. 280-285
-
-
Slovic, P.1
-
32
-
-
80052645437
-
Communicating quantitative risk information
-
C. S. Beck, Ed. Routledge
-
C. Skubisz, T. Reimer, and U. Hoffrage, "Communicating quantitative risk information," in Communication yearbook: Vol. 33, C. S. Beck, Ed. Routledge, 2009, pp. 177-211.
-
(2009)
Communication Yearbook
, vol.33
, pp. 177-211
-
-
Skubisz, C.1
Reimer, T.2
Hoffrage, U.3
-
33
-
-
84880927495
-
Using psychology to counter terrorism at the personal and community level
-
C. Stout, Ed. Praeger Publishers/Greenwood Publishing Group
-
C. Stout, "Using Psychology to Counter Terrorism at the Personal and Community Level," in Psychology of terrorism: Coping with the continuing threat, C. Stout, Ed. Praeger Publishers/Greenwood Publishing Group, 2004, pp. 1-31.
-
(2004)
Psychology of Terrorism: Coping with the Continuing Threat
, pp. 1-31
-
-
Stout, C.1
-
34
-
-
0033288771
-
The visual communication of risk
-
I. Lipkus and J. Hollands, "The visual communication of risk," J. Natl Cancer Inst Monographs, vol. 1999, no. 25, pp. 149-163, 1999.
-
(1999)
J. Natl Cancer Inst Monographs
, vol.1999
, Issue.25
, pp. 149-163
-
-
Lipkus, I.1
Hollands, J.2
-
35
-
-
0038165445
-
Supporting informed consumer health care decisions: Data presentation approaches that facilitate the use of information in choice
-
DOI 10.1146/annurev.publhealth.24.100901.141005
-
J. Hibbard and E. Peters, "Supporting informed consumer health care decisions: data presentation approaches that facilitate the use of information in choice," Annual Review of Public Health, vol. 24, no. 1, pp. 413-433, 2003. (Pubitemid 37056038)
-
(2003)
Annual Review of Public Health
, vol.24
, pp. 413-433
-
-
Hibbard, J.H.1
Peters, E.2
-
36
-
-
35148880584
-
Numeric, verbal, and visual formats of conveying health risks: Suggested best practices and future recommendations
-
DOI 10.1177/0272989X07307271
-
I. Lipkus, "Numeric, verbal, and visual formats of conveying health risks: suggested best practices and future recommendations," Medical Decision Making, vol. 27, no. 5, pp. 696-713, 2007. (Pubitemid 47547606)
-
(2007)
Medical Decision Making
, vol.27
, Issue.5
, pp. 696-713
-
-
Lipkus, I.M.1
-
37
-
-
34147170915
-
Less is more in presenting quality information to consumers
-
DOI 10.1177/10775587070640020301
-
E. Peters, N. Dieckmann, A. Dixon, J. Hibbard, and C. Mertz, "Less is more in presenting quality information to consumers," Medical Care Research and Review, vol. 64, no. 2, pp. 169-190, 2007. (Pubitemid 46570715)
-
(2007)
Medical Care Research and Review
, vol.64
, Issue.2
, pp. 169-190
-
-
Peters, E.1
Dieckmann, N.2
Dixon, A.3
Hibbard, J.H.4
Mertz, C.K.5
-
38
-
-
55349094202
-
Presenting health risk information in different formats: The effect on participants' cognitive and emotional evaluation and decisions
-
D. Timmermans, C. Ockhuysen-Vermey, and L. Henneman, "Presenting health risk information in different formats: the effect on participants' cognitive and emotional evaluation and decisions," Patient Education and Counseling, vol. 73, no. 3, pp. 443-447, 2008.
-
(2008)
Patient Education and Counseling
, vol.73
, Issue.3
, pp. 443-447
-
-
Timmermans, D.1
Ockhuysen-Vermey, C.2
Henneman, L.3
-
39
-
-
70350439768
-
What is my cancer risk? How internet-based cancer risk assessment tools communicate individualized risk estimates to the public: Content analysis
-
E. Waters, H. Sullivan, W. Nelson, and B. Hesse, "What is my cancer risk? how internet-based cancer risk assessment tools communicate individualized risk estimates to the public: content analysis," Journal of Medical Internet Research, vol. 11, no. 3, 2009.
-
(2009)
Journal of Medical Internet Research
, vol.11
, Issue.3
-
-
Waters, E.1
Sullivan, H.2
Nelson, W.3
Hesse, B.4
-
40
-
-
58849089025
-
Probability information in risk communication: A review of the research literature
-
V. Visschers, R. Meertens, W. Passchier, and N. De Vries, "Probability information in risk communication: a review of the research literature," Risk Analysis, vol. 29, no. 2, pp. 267-287, 2009.
-
(2009)
Risk Analysis
, vol.29
, Issue.2
, pp. 267-287
-
-
Visschers, V.1
Meertens, R.2
Passchier, W.3
De Vries, N.4
-
41
-
-
43249117100
-
Numeracy and the perception and communication of risk
-
DOI 10.1196/annals.1399.001, Strategies for Risk Communication Evolution, Evidence, Experience
-
E. Peters, "Numeracy and the perception and communication of risk," Annals of the NY Academy of Sciences, vol. 1128, no. 1, pp. 1-7, 2008. (Pubitemid 351652569)
-
(2008)
Annals of the New York Academy of Sciences
, vol.1128
, pp. 1-7
-
-
Peters, E.1
-
42
-
-
0035085441
-
General performance on a numeracy scale among highly educated samples
-
I. Lipkus, G. Samsa, and B. Rimer, "General performance on a numeracy scale among highly educated samples," Medical Decision Making, vol. 21, no. 1, pp. 37-44, 2001. (Pubitemid 32245029)
-
(2001)
Medical Decision Making
, vol.21
, Issue.1
, pp. 37-44
-
-
Lipkus, I.M.1
Samsa, G.2
Rimer, B.K.3
-
43
-
-
0034833984
-
Assessing values for health: Numeracy matters
-
S. Woloshin, L. Schwartz, M. Moncur, S. Gabriel, and A. Tosteson, "Assessing values for health: numeracy matters," Medical Decision Making, vol. 21, no. 5, pp. 380-388, 2001.
-
(2001)
Medical Decision Making
, vol.21
, Issue.5
, pp. 380-388
-
-
Woloshin, S.1
Schwartz, L.2
Moncur, M.3
Gabriel, S.4
Tosteson, A.5
-
44
-
-
34548572844
-
Making numbers matter: Present and future research in risk communication
-
A. Fagerlin, P. Ubel, D. Smith, and B. Zikmund-Fisher, "Making numbers matter: present and future research in risk communication," American Journal of Health Behavior, vol. 31, no. 1, pp. 47-56, 2007.
-
(2007)
American Journal of Health Behavior
, vol.31
, Issue.1
, pp. 47-56
-
-
Fagerlin, A.1
Ubel, P.2
Smith, D.3
Zikmund-Fisher, B.4
-
45
-
-
0141596114
-
Simple tools for understanding risks: From innumeracy to insight
-
G. Gigerenzer and A. Edwards, "Simple tools for understanding risks: from innumeracy to insight," BMJ: British Medical Journal, vol. 327, no. 7417, pp. 741-744, 2003. (Pubitemid 37176763)
-
(2003)
British Medical Journal
, vol.327
, Issue.7417
, pp. 741-744
-
-
Gigerenzer, G.1
Edwards, A.2
-
46
-
-
27144473946
-
Risk communication in the clinical consultation
-
R. Thomson, A. Edwards, and J. Grey, "Risk communication in the clinical consultation," Clinical Medicine, Journal of the Royal College of Physicians, vol. 5, no. 5, pp. 465-469, 2005. (Pubitemid 41503098)
-
(2005)
Clinical Medicine, Journal of the Royal College of Physicians of London
, vol.5
, Issue.5
, pp. 465-469
-
-
Thomson, R.1
Edwards, A.2
Grey, J.3
-
47
-
-
69049118165
-
Effect of risk ladder format on risk perception in high-and low-numerate individuals
-
C. Keller, M. Siegrist, and V. Visschers, "Effect of Risk Ladder Format on Risk Perception in High-and Low-Numerate Individuals," Risk analysis, vol. 29, no. 9, pp. 1255-1264, 2009.
-
(2009)
Risk Analysis
, vol.29
, Issue.9
, pp. 1255-1264
-
-
Keller, C.1
Siegrist, M.2
Visschers, V.3
-
48
-
-
78650802870
-
A demonstration of less can be morein risk graphics
-
B. Zikmund-Fisher, A. Fagerlin, and P. Ubel, "A Demonstration of Less Can Be Morein Risk Graphics," Medical Decision Making, vol. 30, no. 6, pp. 661-671, 2010.
-
(2010)
Medical Decision Making
, vol.30
, Issue.6
, pp. 661-671
-
-
Zikmund-Fisher, B.1
Fagerlin, A.2
Ubel, P.3
-
49
-
-
43249128536
-
Transparency in risk communication
-
E. Kurz-Milcke, G. Gigerenzer, and L. Martignon, "Transparency in risk communication," Annals of the New York Academy of Sciences, vol. 1128, no. 1, pp. 18-28, 2008.
-
(2008)
Annals of the New York Academy of Sciences
, vol.1128
, Issue.1
, pp. 18-28
-
-
Kurz-Milcke, E.1
Gigerenzer, G.2
Martignon, L.3
-
50
-
-
0141707895
-
How can doctors communicate information about risk more effectively?
-
A. Alaszewski and T. Horlick-Jones, "How can doctors communicate information about risk more effectively?" British Medical Journal, vol. 327, no. 7417, pp. 728-731, 2003. (Pubitemid 37176758)
-
(2003)
British Medical Journal
, vol.327
, Issue.7417
, pp. 728-731
-
-
Alaszewski, A.1
Horlick-Jones, T.2
-
51
-
-
84880946781
-
Lessons learned: Avoiding pitfalls in risk communication
-
P. Wiedemann, H. Schutz, and M. Clauberg, "Lessons learned: Avoiding pitfalls in risk communication," in International Conference and COST 281 Workshop on Emerging EMF Technologies, Potential Sensitive Groups and Health, 2006.
-
(2006)
International Conference and COST 281 Workshop on Emerging EMF Technologies, Potential Sensitive Groups and Health
-
-
Wiedemann, P.1
Schutz, H.2
Clauberg, M.3
-
53
-
-
17644432492
-
Leave no one behind: Improving health and risk communication through attention to literacy
-
R. Rudd, J. Comings, and J. Hyde, "Leave no one behind: improving health and risk communication through attention to literacy," Journal of health communication, vol. 8, pp. 104-115, 2003.
-
(2003)
Journal of Health Communication
, vol.8
, pp. 104-115
-
-
Rudd, R.1
Comings, J.2
Hyde, J.3
-
54
-
-
0342322905
-
Factors in risk perception
-
L. Sjöberg, "Factors in risk perception," Risk analysis, vol. 20, no. 1, pp. 1-12, 2000.
-
(2000)
Risk Analysis
, vol.20
, Issue.1
, pp. 1-12
-
-
Sjöberg, L.1
-
55
-
-
33745390248
-
The role of the affect and availability heuristics in risk communication
-
DOI 10.1111/j.1539-6924.2006.00773.x
-
C. Keller, M. Siegrist, and H. Gutscher, "The role of the affect and availability heuristics in risk communication," Risk Analysis, vol. 26, no. 3, pp. 631-639, 2006. (Pubitemid 43944581)
-
(2006)
Risk Analysis
, vol.26
, Issue.3
, pp. 631-639
-
-
Keller, C.1
Siegrist, M.2
Gutscher, H.3
-
56
-
-
2442472242
-
Risk as Analysis and Risk as Feelings: Some Thoughts about Affect, Reason, Risk, and Rationality
-
DOI 10.1111/j.0272-4332.2004.00433.x
-
P. Slovic, M. Finucane, E. Peters, and D. MacGregor, "Risk as analysis and risk as feelings: Some thoughts about affect, reason, risk, and rationality," Risk analysis, vol. 24, no. 2, pp. 311-322, 2004. (Pubitemid 38620129)
-
(2004)
Risk Analysis
, vol.24
, Issue.2
, pp. 311-322
-
-
Slovic, P.1
Finucane, M.L.2
Peters, E.3
MacGregor, D.G.4
-
57
-
-
77951995937
-
Perceptions of risk in cyberspace
-
Edward Elgar
-
J. Jackson, N. Allum, and G. Gaskell, "Perceptions of risk in cyberspace," in Trust and Crime in Information Societies. Edward Elgar, 2005, pp. 245-281.
-
(2005)
Trust and Crime in Information Societies
, pp. 245-281
-
-
Jackson, J.1
Allum, N.2
Gaskell, G.3
-
58
-
-
39749181722
-
Trust, Confidence and Cooperation model: A framework for understanding the relation between trust and Risk Perception
-
DOI 10.1504/IJGENVI.2008.017257
-
T. Earle and M. Siegrist, "Trust, Confidence and Cooperation model: a framework for understanding the relation between trust and Risk Perception," International Journal of Global Environmental Issues, vol. 8, no. 1, pp. 17-29, 2008. (Pubitemid 351301194)
-
(2008)
International Journal of Global Environmental Issues
, vol.8
, Issue.1-2
, pp. 17-29
-
-
Earle, T.1
Siegrist, M.2
-
59
-
-
38149038797
-
A survey of factors influencing peoples perception of information security
-
J. Jacko, Ed. Springer
-
D.-L. Huang, P.-L. Rau, and G. Salvendy, "A survey of factors influencing peoples perception of information security," in Human-Computer Interaction. HCI Applications and Services, ser. Lecture Notes in Computer Science, J. Jacko, Ed. Springer, 2007, vol. 4553, pp. 906-915.
-
(2007)
Human-Computer Interaction. HCI Applications and Services, Ser. Lecture Notes in Computer Science
, vol.4553
, pp. 906-915
-
-
Huang, D.-L.1
Rau, P.-L.2
Salvendy, G.3
-
61
-
-
84870957265
-
Incentives and perceptions of information security risks
-
F. Farahmand, M. Atallah, and B. Konsynski, "Incentives and perceptions of information security risks," 29th International Conference on Information Systems (ICIS), pp. 25-41, 2008.
-
(2008)
29th International Conference on Information Systems (ICIS)
, pp. 25-41
-
-
Farahmand, F.1
Atallah, M.2
Konsynski, B.3
-
62
-
-
84870375304
-
An investigation of decision-making and the tradeoffs involving computer security risk
-
L. Chen and D. Farkas, "An investigation of decision-making and the tradeoffs involving computer security risk," 15th Americas Conference on Information Systems (AMCIS), pp. 610-618, 2009.
-
(2009)
15th Americas Conference on Information Systems (AMCIS)
, pp. 610-618
-
-
Chen, L.1
Farkas, D.2
-
63
-
-
79953080335
-
The weakest link: A psychological perspective on why users make poor security decisions
-
IGI Global
-
R. West, C. Mayhorn, J. Hardee, and J. Mendel, "The weakest link: A psychological perspective on why users make poor security decisions," in Social and Human Elements of Information Security: Emerging Trends and Countermeasures. IGI Global, 2009, pp. 43-60.
-
(2009)
Social and Human Elements of Information Security: Emerging Trends and Countermeasures
, pp. 43-60
-
-
West, R.1
Mayhorn, C.2
Hardee, J.3
Mendel, J.4
-
64
-
-
42149161709
-
The psychology of security
-
DOI 10.1145/1330311.1330320
-
R. West, "The psychology of security," Communications of the ACM, vol. 51, no. 4, pp. 34-40, 2008. (Pubitemid 351530776)
-
(2008)
Communications of the ACM
, vol.51
, Issue.4
, pp. 34-40
-
-
West, R.1
-
65
-
-
79952932797
-
Knowledge of online security risks and consumer decision making: An experimental study
-
IEEE Computer Society
-
P. Wang and E. Nyshadham, "Knowledge of online security risks and consumer decision making: An experimental study," in 44th Hawaii International Conference on Systems Sciences (HICSS). IEEE Computer Society, 2011, pp. 1-10.
-
(2011)
44th Hawaii International Conference on Systems Sciences (HICSS)
, pp. 1-10
-
-
Wang, P.1
Nyshadham, E.2
-
67
-
-
78049358662
-
Assessing the usability of end-user security software
-
S. Katsikas, J. Lopez, and M. Soriano, Eds. Springer
-
T. Ibrahim, S. Furnell, M. Papadaki, and N. Clarke, "Assessing the usability of end-user security software," in Trust, Privacy and Security in Digital Business, ser. Lecture Notes in Computer Science, S. Katsikas, J. Lopez, and M. Soriano, Eds. Springer, 2010, vol. 6264, pp. 177-189.
-
(2010)
Trust, Privacy and Security in Digital Business, Ser. Lecture Notes in Computer Science
, vol.6264
, pp. 177-189
-
-
Ibrahim, T.1
Furnell, S.2
Papadaki, M.3
Clarke, N.4
-
68
-
-
79953645142
-
Bridging the gap in computer security warnings: A mental model approach
-
C. Bravo-Lillo, L. Cranor, J. Downs, and S. Komanduri, "Bridging the gap in computer security warnings: A mental model approach," IEEE Security & Privacy, vol. 9, no. 2, pp. 18-26, 2011.
-
(2011)
IEEE Security & Privacy
, vol.9
, Issue.2
, pp. 18-26
-
-
Bravo-Lillo, C.1
Cranor, L.2
Downs, J.3
Komanduri, S.4
-
69
-
-
70350697857
-
Guidelines for designing IT security management tools
-
P. Jaferian, D. Botta, F. Raja, K. Hawkey, and K. Beznosov, "Guidelines for designing IT security management tools," in 2nd ACM Symposium on Computer Human interaction For Management of information Technology, 2008, pp. 1-10.
-
(2008)
2nd ACM Symposium on Computer Human Interaction for Management of Information Technology
, pp. 1-10
-
-
Jaferian, P.1
Botta, D.2
Raja, F.3
Hawkey, K.4
Beznosov, K.5
-
70
-
-
79957945178
-
Heuristics for evaluating it security management tools
-
ACM
-
P. Jaferian, K. Hawkey, A. Sotirakopoulos, and K. Beznosov, "Heuristics for evaluating it security management tools," in 2011 Annual Conference Extended Abstracts on Human factors in Computing Systems. ACM, 2011, pp. 1633-1638.
-
(2011)
2011 Annual Conference Extended Abstracts on Human Factors in Computing Systems
, pp. 1633-1638
-
-
Jaferian, P.1
Hawkey, K.2
Sotirakopoulos, A.3
Beznosov, K.4
-
71
-
-
70350656930
-
Even experts deserve usable security: Design guidelines for security management systems
-
S. Chiasson, R. Biddle, and A. Somayaji, "Even experts deserve usable security: Design guidelines for security management systems," in Symposium on Usable Security and Privacy Workshop at Usable IT Security Management (USM), 2007, pp. 1-4.
-
(2007)
Symposium on Usable Security and Privacy Workshop at Usable IT Security Management (USM)
, pp. 1-4
-
-
Chiasson, S.1
Biddle, R.2
Somayaji, A.3
-
75
-
-
84880933062
-
-
Lookingglass Cyber Solutions
-
Lookingglass Cyber Solutions, "ScoutVision™." [Online]. Available: http://www.lgscout.com/products/scoutvision
-
ScoutVision™
-
-
-
76
-
-
78149452270
-
Nimble cybersecurity incident management through visualization and defensible recommendations
-
ACM
-
J. Rasmussen, K. Ehrlich, S. Ross, S. Kirk, D. Gruen, and J. Patterson, "Nimble cybersecurity incident management through visualization and defensible recommendations," in 7th International Symposium on Visualization for Cyber Security (VizSec). ACM, 2010, pp. 102-113.
-
(2010)
7th International Symposium on Visualization for Cyber Security (VizSec)
, pp. 102-113
-
-
Rasmussen, J.1
Ehrlich, K.2
Ross, S.3
Kirk, S.4
Gruen, D.5
Patterson, J.6
-
77
-
-
0035254919
-
On the state of the art: Risk communication to the public
-
DOI 10.1016/S0951-8320(00)00090-9
-
V. Bier, "On the state of the art: risk communication to the public," Reliability Engineering & System Safety, vol. 71, no. 2, pp. 139-150, 2001. (Pubitemid 32034818)
-
(2001)
Reliability Engineering and System Safety
, vol.71
, Issue.2
, pp. 139-150
-
-
Bier, V.M.1
-
78
-
-
34548191020
-
Risky communication: Pitfalls in counseling about risk, and how to avoid them
-
DOI 10.1007/s10897-006-9077-9
-
K. O'Doherty and G. Suthers, "Risky communication: pitfalls in counseling about risk, and how to avoid them," Journal of Genetic Counseling, vol. 16, no. 4, pp. 409-417, 2007. (Pubitemid 47305499)
-
(2007)
Journal of Genetic Counseling
, vol.16
, Issue.4
, pp. 409-417
-
-
O'Doherty, K.1
Suthers, G.K.2
-
79
-
-
0027480867
-
Some criteria for evaluating risk messages
-
N. D. Weinstein and P. M. Sandman, "Some Criteria for Evaluating Risk Messages," Risk Analysis, vol. 13, no. 1, pp. 103-114, 1993. (Pubitemid 23082186)
-
(1993)
Risk Analysis
, vol.13
, Issue.1
, pp. 103-114
-
-
Weinstein, N.D.1
Sandman, P.M.2
-
80
-
-
79952614687
-
Informing security indicator design in web browsers
-
ACM
-
P. Shi, H. Xu, and X. Zhang, "Informing security indicator design in web browsers," in 2011 iConference. ACM, 2011, pp. 569-575.
-
(2011)
2011 IConference
, pp. 569-575
-
-
Shi, P.1
Xu, H.2
Zhang, X.3
|