-
2
-
-
32444433117
-
The challenges of understanding and using security: A survey of end-users
-
Furnell, S.M., Jusoh, A. and Katsabas D. (2006), "The challenges of understanding and using security: A survey of end-users, Computers & Security, Vol. 25, No. 1, pp27-35.
-
(2006)
Computers & Security
, vol.25
, Issue.1
, pp. 27-35
-
-
Furnell, S.M.1
Jusoh, A.2
Katsabas, D.3
-
3
-
-
37249019175
-
The fourth amendment and privacy issues on the "new" internet: Facebook.com and MySpace.com
-
Hodge, M.J. (2006), "The Fourth Amendment and privacy issues on the "new" Internet: Facebook.com and MySpace.com", Southern Illinois University Law Journal, Vol. 31, pp95-122.
-
(2006)
Southern Illinois University Law Journal
, vol.31
, pp. 95-122
-
-
Hodge, M.J.1
-
4
-
-
0012741020
-
-
Second edition, McGraw-Hill-Education, Berkshire, England
-
Lethbridge, T.C. and Laganiere, R. (2005), Object-oriented software engineering: Practical software development using UML and Java, Second edition, McGraw-Hill-Education, Berkshire, England, ISBN: 9780077109080.
-
(2005)
Object-oriented Software Engineering: Practical Software Development Using UML and Java
-
-
Lethbridge, T.C.1
Laganiere, R.2
-
5
-
-
0001775576
-
Heuristic evaluation
-
Nielsen J. and Mack, R.L. (Ed), John Wiley & Sons, New York
-
Nielsen, J. (1994), "Heuristic evaluation", in Nielsen J. and Mack, R.L. (Ed), Usability inspection methods, John Wiley & Sons, New York, ISBN: 0-471-01877-5.
-
(1994)
Usability Inspection Methods
-
-
Nielsen, J.1
-
8
-
-
35348863698
-
Usable security why do we need it? How do we get it?
-
Cranor, L.F. and Garfinkel, S. (Ed), O' Reilly Media Inc., Sebastopol, CA
-
Sasse, M. and Flechais, I. (2005), "Usable Security Why do we need it? How do we get it?", in Cranor, L.F. and Garfinkel, S. (Ed), Security and Usability: Designing Secure Systems That People Can Use, O' Reilly Media Inc., Sebastopol, CA. ISBN: 0-596-00827-9.
-
(2005)
Security and Usability: Designing Secure Systems That People Can Use
-
-
Sasse, M.1
Flechais, I.2
-
9
-
-
84926356732
-
Evidence based design of heuristics for computer assisted assessment
-
Uppsala, Sweden
-
Sim, G., Read, J.C. and Cockton, G. (2009), "Evidence based design of heuristics for computer assisted assessment", in INTERACT '09 proceedings of the 12th IFIP TC 13 International Conference on Human-Computer Interaction: Part I, Uppsala, Sweden.
-
(2009)
INTERACT '09 Proceedings of the 12th IFIP TC 13 International Conference on Human-Computer Interaction: Part I
-
-
Sim, G.1
Read, J.C.2
Cockton, G.3
-
10
-
-
77956357772
-
Why johnny can't encrypt: A usability evaluation of PGP 5.0
-
Cranor, L.F. and Garfinkel, S. (Ed), O' Reilly Media Inc., Sebastopol, CA
-
Whitten, A. and Tygar, J.D. (2005), "Why Johnny can't encrypt: A usability evaluation of PGP 5.0", in Cranor, L.F. and Garfinkel, S. (Ed), Security and Usability: Designing Secure Systems That People Can Use, O' Reilly Media Inc., Sebastopol, CA. ISBN: 0-596-00827-9.
-
(2005)
Security and Usability: Designing Secure Systems That People Can Use
-
-
Whitten, A.1
Tygar, J.D.2
-
11
-
-
0038343292
-
Why and when five test users aren't enough
-
Vanderdonckt, J., Blandford, A. and Derycke, A. (Ed), Toulouse, France
-
Woolrych, A. and Cockton, G. (2001), "Why and when five test users aren't enough", in Vanderdonckt, J., Blandford, A. and Derycke, A. (Ed), in proceedings of IHM-HCI 2001, Toulouse, France, Vol. 2, pp105-108.
-
(2001)
Proceedings of IHM-HCI 2001
, vol.2
, pp. 105-108
-
-
Woolrych, A.1
Cockton, G.2
-
12
-
-
84944056366
-
User interaction design for secure systems
-
Springer-Verlag, London, UK
-
Yee, K. (2002), "User interaction design for secure systems", in proceedings of the 4th International Conference on Information and Communications Security, 2002 (ICICS' 02), Springer-Verlag, London, UK, pp 278-290.
-
(2002)
Proceedings of the 4th International Conference on Information and Communications Security, 2002 (ICICS' 02)
, pp. 278-290
-
-
Yee, K.1
-
13
-
-
84866328416
-
A three-phase process to develop heuristics
-
14-16 September 2011, Johannesburg, South Africa
-
Yeratziotis, A., Pottas, D. and van Greunen, D. (2011a), "A Three-Phase Process to Develop Heuristics", in proceedings of the 13th ZA-WWW conference, 14-16 September 2011, Johannesburg, South Africa.
-
(2011)
Proceedings of the 13th ZA-WWW Conference
-
-
Yeratziotis, A.1
Pottas, D.2
Van Greunen, D.3
-
14
-
-
84855888944
-
Recommendations for usable security in online health social networks
-
26-28 October 2011, Port Elizabeth, South Africa
-
Yeratziotis, A., Pottas, D. and van Greunen, D. (2011b), "Recommendations for Usable Security in Online Health Social Networks", in proceedings of the joint conference of the 2011 6th International Conference on Pervasive Computing and Application (ICPCA) and the 2011 3rd International Symposium of Web Society (SWS), 26-28 October 2011, Port Elizabeth, South Africa.
-
(2011)
Proceedings of the Joint Conference of the 2011 6th International Conference on Pervasive Computing and Application (ICPCA) and the 2011 3rd International Symposium of Web Society (SWS)
-
-
Yeratziotis, A.1
Pottas, D.2
Van Greunen, D.3
-
15
-
-
84866328564
-
A usable security heuristic evaluation for the online health social networking paradigm
-
Yeratziotis, A., Pottas, D. and van Greunen, D. (2012), "A usable security heuristic evaluation for the online health social networking paradigm", International Journal of Human-Computer Interaction, Vol. 29, No. 3.
-
(2012)
International Journal of Human-Computer Interaction
, vol.29
, Issue.3
-
-
Yeratziotis, A.1
Pottas, D.2
Van Greunen, D.3
|