-
1
-
-
77950564668
-
The compliance budget: Managing security behaviour in organisations
-
A. Beautement, M.A. Sasse, and M. Wonham, "The Compliance Budget: Managing Security Behaviour in Organisations," Proc. 2008 New Security Paradigms Workshop, ACM, 2008, pp. 47-58.
-
(2008)
Proc. 2008 New Security Paradigms Workshop, ACM
, pp. 47-58
-
-
Beautement, A.1
Sasse, M.A.2
Wonham, M.3
-
3
-
-
84952016586
-
Too stupid to look the other way
-
29 Oct.
-
E. Felten, "Too Stupid to Look the Other Way," Freedom to Tinker, 29 Oct. 2002; https://freedom-totinker. com/blog/felten/too-stupid-look-other-way.
-
(2002)
Freedom to Tinker
-
-
Felten, E.1
-
4
-
-
34548489645
-
Unintended consequences of information technologies in health care - An interactive sociotechnical analysis
-
M. Harrison, R. Koppel, and S. Bar-Lev, "Unintended Consequences of Information Technologies in Health Care - An Interactive Sociotechnical Analysis," J. Am Medical Informatics Assoc., vol. 14, no. 5, 2007, pp. 542-549.
-
(2007)
J. Am Medical Informatics Assoc.
, vol.14
, Issue.5
, pp. 542-549
-
-
Harrison, M.1
Koppel, R.2
Bar-Lev, S.3
-
5
-
-
77950877250
-
So long, and no thanks for the externalities: The rational rejection of security advice by users
-
ACM
-
C. Herley, "So Long, and No Thanks for the Externalities: The Rational Rejection of Security Advice by Users," Proc. New Security Paradigms Workshop, ACM, 2009, pp. 133-144.
-
(2009)
Proc. New Security Paradigms Workshop
, pp. 133-144
-
-
Herley, C.1
-
7
-
-
0033881650
-
Real life, real users, and real needs: A study and analysis of user queries on the web
-
B.J. Jansen, A. Spink, and T. Saracevic, "Real Life, Real Users, and Real Needs: A Study and Analysis of User Queries on the Web," Information Processing & Management, vol. 36, no. 2, 2000, pp. 207-227.
-
(2000)
Information Processing & Management
, vol.36
, Issue.2
, pp. 207-227
-
-
Jansen, B.J.1
Spink, A.2
Saracevic, T.3
-
8
-
-
39349101677
-
Password security: What users know and what they actually do
-
February
-
S. Riley. "Password Security: What Users Know and What They Actually Do." Usability News. 8(1), February 2006.
-
(2006)
Usability News
, vol.8
, Issue.1
-
-
Riley, S.1
-
9
-
-
84886560150
-
Comparative user experiences of health IT products: How user experiences would be reported and used
-
C. Sinsky et al., "Comparative User Experiences of Health IT Products: How User Experiences Would Be Reported and Used." Inst. Medicine of the Nat'l Academies, 2012.
-
(2012)
Inst. Medicine of the Nat'l Academies
-
-
Sinsky, C.1
-
11
-
-
45849139772
-
Workarounds to barcode medication administration systems: Their occurrences, causes, and threats to patient safety
-
R. Koppel et al., "Workarounds to Barcode Medication Administration Systems: Their Occurrences, Causes, and Threats to Patient Safety," J. Am Medical Informatics Assoc., 15(4) 2008, pp. 408-423.
-
(2008)
J. Am Medical Informatics Assoc.
, vol.15
, Issue.4
, pp. 408-423
-
-
Koppel, R.1
-
12
-
-
84890454161
-
Healthcare information technology's relativity problems: A typology of how patients' physical reality, clinicians' mental models, and healthcare information technology differ
-
S.W. Smith and R. Koppel, "Healthcare Information Technology's Relativity Problems: A Typology of How Patients' Physical Reality, Clinicians' Mental Models, and Healthcare Information Technology Differ," J. Am. Medical Informatics Assoc., 2013; doi:10.1136/amiajnl-2012-001419.
-
(2013)
J. Am. Medical Informatics Assoc.
-
-
Smith, S.W.1
Koppel, R.2
-
13
-
-
84952013731
-
OIG: Certified EHRs aren't so secure
-
August 5, 2014
-
E. McCann. "OIG: Certified EHRs aren't so secure." Health Care IT News. August 5, 2014. http://www.healthcareitnews.com/news/oig-certified-ehrs-arent-so-secure
-
Health Care IT News
-
-
McCann, E.1
-
15
-
-
83455219590
-
Security dilemma: Healthcare clinicians at work
-
R.R. Heckle. "Security Dilemma: Healthcare Clinicians at Work." IEEE Security and Privacy. 9(6):14 - 19. 2011.
-
(2011)
IEEE Security and Privacy.
, vol.9
, Issue.6
, pp. 14-19
-
-
Heckle, R.R.1
-
16
-
-
14544304095
-
Role of computerized physician order entry systems in facilitating medication errors
-
Mar 9
-
R. Koppel et al. "Role of computerized physician order entry systems in facilitating medication errors." JAMA: J. Amer Medical Assoc. Mar 9, 2005. 293:10, pp.1197-1203
-
(2005)
JAMA: J. Amer Medical Assoc.
, vol.293
, Issue.10
, pp. 1197-1203
-
-
Koppel, R.1
-
17
-
-
77955131538
-
What's wrong with access control in the real world
-
S. Sinclair and S.W. Smith, "What's Wrong with Access Control in the Real World," IEEE Security & Privacy, vol. 8, no. 4, 2010, pp. 74-77.
-
(2010)
IEEE Security & Privacy
, vol.8
, Issue.4
, pp. 74-77
-
-
Sinclair, S.1
Smith, S.W.2
-
18
-
-
34548489645
-
Unintended consequences of information technologies in health care - An interactive sociotechnical analysis
-
M. Harrison et al. "Unintended Consequences of Information Technologies in Health Care - An Interactive Sociotechnical Analysis." J. Am Medical Informatics Assoc. 14(5): 542-549. 2005.
-
(2005)
J. Am Medical Informatics Assoc.
, vol.14
, Issue.5
, pp. 542-549
-
-
Harrison, M.1
-
19
-
-
84872284752
-
Why do patients derogate physicians who use a computer-based diagnostic support system?
-
V. Shaffer et al. "Why Do Patients Derogate Physicians Who Use a Computer-Based Diagnostic Support System?" Medical Decision Making. 33: 108 2013.
-
(2013)
Medical Decision Making.
, vol.33
, pp. 108
-
-
Shaffer, V.1
|