-
1
-
-
0043232732
-
Users are not the Enemy: Why users compromise computer security mechanisms and how to take remedial measures
-
Adams A. and Sasse M. (1999), Users are not the Enemy: Why users compromise computer security mechanisms and how to take remedial measures, Commun. ACM 42.
-
(1999)
Commun. ACM
, pp. 42
-
-
Adams, A.1
Sasse, M.2
-
2
-
-
0035387175
-
Transforming the "weakest link": A humancomputer interaction approach to usable and effective security
-
Brostoff S., Sasse A. and Weirich D. (2002), Transforming the "weakest link": A Humancomputer Interaction Approach to Usable and Effective Security, BT Technology Journal 19(3), 122-131.
-
(2002)
BT Technology Journal
, vol.19
, Issue.3
, pp. 122-131
-
-
Brostoff, S.1
Sasse, A.2
Weirich, D.3
-
4
-
-
84926042788
-
-
AP., Accessed 6 Mar. 2006
-
Dalrymple, M. (2005), Auditors Find IRS Workers Prone to Hackers. [Online]. AP. Available from: http://sfgate.com/cgi-bin/article.cgi?file=/news/archive/2005/03/16/national/w162055S07. DTL, (Accessed 6 Mar. 2006)
-
(2005)
Auditors Find IRS Workers Prone to Hackers
-
-
Dalrymple, M.1
-
5
-
-
84925986433
-
-
Accessed 29 Jan 2007
-
De Melo, D. (2007), Sutherland's Differential Association. [Online]. Available from: http://home.comcast.net/~ddemelo/crime/differ.html, (Accessed 29 Jan 2007)
-
(2007)
Sutherland's Differential Association
-
-
De Melo, D.1
-
6
-
-
3242786183
-
Culture, crime, and cultural criminology
-
1995
-
Ferrell, J. (1995), Culture, Crime, and Cultural Criminology. Journal of Criminal Justice and Popular Culture, 3 (2) (1995) 25-42.
-
(1995)
Journal of Criminal Justice and Popular Culture
, vol.3
, Issue.2
, pp. 25-42
-
-
Ferrell, J.1
-
7
-
-
84887839075
-
The signs, signifiers and semiotics of the successful semantic attack
-
St. Juliens/Valletta, Malta, 2005
-
Jordan, J. and Goudey, H. (2005), The signs, signifiers and semiotics of the successful semantic attack. Presented at the 14th Annual EICAR Conference, St. Juliens/Valletta, Malta, 2005.
-
(2005)
The 14th Annual EICAR Conference
-
-
Jordan, J.1
Goudey, H.2
-
9
-
-
84925986431
-
Value based risk assessment: The key to a successful security target for the telecommunication industry
-
2002
-
Kowalski, S. (2002), Value Based Risk Assessment: The Key to a Successful Security Target for the Telecommunication Industry, 3rd International Common Criteria Conference (ICCC) Ottawa, 2002.
-
(2002)
3rd International Common Criteria Conference (ICCC) Ottawa
-
-
Kowalski, S.1
-
11
-
-
9544229100
-
-
Indianapolis: Wiley Publishing, Inc.
-
Mitnick, K. (2002), The Art of deception. Indianapolis: Wiley Publishing, Inc., ISBN: 076454280X.
-
(2002)
The Art of Deception
-
-
Mitnick, K.1
-
14
-
-
33748968091
-
-
CNN, Accessed 28 Mar. 2008
-
Tanneeru, M. (2005) A convicted hacker debunks some myths. [Online]. CNN. Available at: http://edition. cnn. com/2005/TECH/internet/10/07/kevin. mitnick.cnna/index.html (Accessed 28 Mar. 2008)
-
(2005)
A Convicted Hacker Debunks Some Myths
-
-
Tanneeru, M.1
-
16
-
-
85084161283
-
Information security technology?... Don't rely on it a case study in social engineering
-
Accessed 12 Apr. 2004
-
Winkler, I. and Dealt, B. (1995), Information Security Technology?... Don't rely on it A case Study in Social Engineering. [Online]. Proceedings of the Fifth USENIX UNIX Security Symposium. Available at: http://www.usenix.org/publications/library/proceedings/security95/full-papers/winkler.ps, (Accessed 12 Apr. 2004)
-
(1995)
Proceedings of the Fifth USENIX UNIX Security Symposium
-
-
Winkler, I.1
Dealt, B.2
|