메뉴 건너뛰기




Volumn 8, Issue 6, 2004, Pages 391-401

Security in the wild: User strategies for managing security as an everyday, practical problem

Author keywords

[No Author keywords available]

Indexed keywords

HARDWARE;

EID: 84900482702     PISSN: 16174909     EISSN: None     Source Type: Journal    
DOI: 10.1007/s00779-004-0308-5     Document Type: Article
Times cited : (245)

References (34)
  • 1
    • 0034459145 scopus 로고    scopus 로고
    • The intellectual challenge of CSCW: The gap between social requirements and technical feasibility
    • Ackerman MS (2000) The intellectual challenge of CSCW: the gap between social requirements and technical feasibility. Hum Comput Interact 15(2-3):179-203
    • (2000) Hum Comput Interact , vol.15 , Issue.2-3 , pp. 179-203
    • Ackerman, M.S.1
  • 2
    • 0043232732 scopus 로고    scopus 로고
    • Users are not the enemy: Why users compromise security mechanisms and how to take remedial measures
    • Adams A, Sasse MA (1999) Users are not the enemy: why users compromise security mechanisms and how to take remedial measures. Commun ACM 42(12):40-46
    • (1999) Commun ACM , vol.42 , Issue.12 , pp. 40-46
    • Adams, A.1    Sasse, M.A.2
  • 3
    • 0242444871 scopus 로고    scopus 로고
    • Making passwords secure and usable
    • Thimbleby H, O'Connaill B, Thomas P (eds), Bristol, UK, August 1997. Springer, Berlin Heidelberg New York
    • Adams A, Sasse MA, Lunt P (1997) Making passwords secure and usable. In: Thimbleby H, O'Connaill B, Thomas P (eds) Proceedings of the HCI'97 conference on people and computers XII, Bristol, UK, August 1997. Springer, Berlin Heidelberg New York, pp 1-19
    • (1997) Proceedings of the HCI'97 Conference on People and Computers XII , pp. 1-19
    • Adams, A.1    Sasse, M.A.2    Lunt, P.3
  • 8
    • 0003429117 scopus 로고    scopus 로고
    • Are passfaces more usable than passwords? A field trial investigation
    • McDonald S, Waern Y, Cockton G (eds), Sunderland, UK, September 2000. Springer, Berlin Heidelberg New York
    • Brostoff S, Sasse MA (2000) Are passfaces more usable than passwords? A field trial investigation. In: McDonald S, Waern Y, Cockton G (eds) Proceedings of the HCI 2000 conference on people and computers XIV-usability or else!, Sunderland, UK, September 2000. Springer, Berlin Heidelberg New York, pp 405-424
    • (2000) Proceedings of the HCI 2000 Conference on People and Computers XIV-usability or Else! , pp. 405-424
    • Brostoff, S.1    Sasse, M.A.2
  • 10
    • 0242696305 scopus 로고    scopus 로고
    • An approach to usable security based on event monitoring and visualization
    • Virginia Beach, Virginia, September 2002. ACM Press, New York
    • Dourish P, Redmiles D (2002) An approach to usable security based on event monitoring and visualization. In: Proceedings of the ACM new security paradigms workshop (NSPW 2002), Virginia Beach, Virginia, September 2002. ACM Press, New York
    • (2002) Proceedings of the ACM New Security Paradigms Workshop (NSPW 2002)
    • Dourish, P.1    Redmiles, D.2
  • 16
    • 0033489646 scopus 로고    scopus 로고
    • Security service level agreements: Quantifiable security for the enterprise?
    • Ontario, Canada, September 1999. ACM Press, New York
    • Henning R (1999) Security service level agreements: quantifiable security for the enterprise? In: Proceedings of the ACM new security paradigm workshop (NSPW'99), Ontario, Canada, September 1999. ACM Press, New York, pp 54-60
    • (1999) Proceedings of the ACM New Security Paradigm Workshop (NSPW'99) , pp. 54-60
    • Henning, R.1
  • 18
    • 33845622734 scopus 로고    scopus 로고
    • The interactive workspaces project: Experiences with ubiquitous computing rooms
    • Johanson B, Fox A, Winograd T (2002) The interactive workspaces project: experiences with ubiquitous computing rooms. IEEE Pervasive Comput 1(2):67-75
    • (2002) IEEE Pervasive Comput , vol.1 , Issue.2 , pp. 67-75
    • Johanson, B.1    Fox, A.2    Winograd, T.3
  • 19
    • 0142156649 scopus 로고    scopus 로고
    • Secure spontaneous device association
    • Seattle, Washington, October 2003. Lecture notes in computer science LNCS 2864, Springer, Berlin Heidelberg New York
    • Kindberg T, Zhang K (2003) Secure spontaneous device association. In: Proceedings of the 5th international conference on ubiquitous computing (Ubicomp 2003), Seattle, Washington, October 2003. Lecture notes in computer science LNCS 2864, Springer, Berlin Heidelberg New York
    • (2003) Proceedings of the 5th International Conference on Ubiquitous Computing (Ubicomp 2003)
    • Kindberg, T.1    Zhang, K.2
  • 20
    • 0035570307 scopus 로고    scopus 로고
    • Special issue on contextaware computing
    • Moran T, Dourish P (eds) (2001) Special issue on contextaware computing. Hum Comput Interact 16(2-4):87
    • (2001) Hum Comput Interact , vol.16 , Issue.2-4 , pp. 87
    • Moran, T.1    Dourish, P.2
  • 23
    • 0036005221 scopus 로고    scopus 로고
    • Towards a typology of internet users and online privacy concerns
    • Sheehan K (2002) Towards a typology of internet users and online privacy concerns. Inf Soc 18:21-32
    • (2002) Inf Soc , vol.18 , pp. 21-32
    • Sheehan, K.1
  • 24
    • 0036297419 scopus 로고    scopus 로고
    • How web browsers shape users' understanding of networks
    • Sheeran L, Sasse A, Rimmer J, Wakeman I (2001) How web browsers shape users' understanding of networks. Electron Libr 20(1):35-42
    • (2001) Electron Libr , vol.20 , Issue.1 , pp. 35-42
    • Sheeran, L.1    Sasse, A.2    Rimmer, J.3    Wakeman, I.4
  • 25
    • 0038226921 scopus 로고    scopus 로고
    • Moving from the design of usable security technologies to the design of useful secure applications
    • Virginia Beach, Virginia, September 2002. ACM Press, New York
    • Smetters D, Grinter R (2002) Moving from the design of usable security technologies to the design of useful secure applications. In: Proceedings of the ACM new security paradigms workshop (NSPW 2002), Virginia Beach, Virginia, September 2002. ACM Press, New York
    • (2002) Proceedings of the ACM New Security Paradigms Workshop (NSPW 2002)
    • Smetters, D.1    Grinter, R.2
  • 29
    • 0242708745 scopus 로고    scopus 로고
    • Pretty good persuasion: A first step towards effective password security for the real world
    • Cloudcroft, New Mexico, September 2001. ACM Press, New York, pp 137-143
    • Weirich D, Sasse MA (2001) Pretty good persuasion: a first step towards effective password security for the real world. In: Proceedings of the ACM new security paradigms workshop (NSPW 2001), Cloudcroft, New Mexico, September 2001. ACM Press, New York, pp 137-143
    • (2001) Proceedings of the ACM New Security Paradigms Workshop (NSPW 2001)
    • Weirich, D.1    Sasse, M.A.2
  • 30
    • 0001853125 scopus 로고
    • The computer for the 21st century
    • Weiser M (1991) The computer for the 21st century. Sci Am 265(3):94-104
    • (1991) Sci Am , vol.265 , Issue.3 , pp. 94-104
    • Weiser, M.1
  • 31
    • 84976653144 scopus 로고
    • Some computer science issues in ubiquitous computing
    • Weiser M (1993) Some computer science issues in ubiquitous computing. Commun ACM 36(7):74-83
    • (1993) Commun ACM , vol.36 , Issue.7 , pp. 74-83
    • Weiser, M.1
  • 32


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.