메뉴 건너뛰기




Volumn , Issue , 2012, Pages 97-107

A framework for evaluating usable security: The case of online health social networks

Author keywords

Framework; Heuristic evaluation; Online health social networks; Three phase process; Usable security; Validation tool

Indexed keywords

COMPUTER PRIVACY; HEALTH; MOBILE SECURITY; SECURITY OF DATA; WEBSITES;

EID: 84926342410     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (8)

References (15)
  • 2
    • 32444433117 scopus 로고    scopus 로고
    • The challenges of understanding and using security: A survey of end-users
    • Furnell, S.M., Jusoh, A. and Katsabas D. (2006), "The challenges of understanding and using security: A survey of end-users, Computers & Security, Vol. 25, No. 1, pp27-35.
    • (2006) Computers & Security , vol.25 , Issue.1 , pp. 27-35
    • Furnell, S.M.1    Jusoh, A.2    Katsabas, D.3
  • 3
    • 37249019175 scopus 로고    scopus 로고
    • The fourth amendment and privacy issues on the "new" internet: Facebook.com and MySpace.com
    • Hodge, M.J. (2006), "The Fourth Amendment and privacy issues on the "new" Internet: Facebook.com and MySpace.com", Southern Illinois University Law Journal, Vol. 31, pp95-122.
    • (2006) Southern Illinois University Law Journal , vol.31 , pp. 95-122
    • Hodge, M.J.1
  • 5
    • 0001775576 scopus 로고
    • Heuristic evaluation
    • Nielsen J. and Mack, R.L. (Ed), John Wiley & Sons, New York
    • Nielsen, J. (1994), "Heuristic evaluation", in Nielsen J. and Mack, R.L. (Ed), Usability inspection methods, John Wiley & Sons, New York, ISBN: 0-471-01877-5.
    • (1994) Usability Inspection Methods
    • Nielsen, J.1
  • 8
    • 35348863698 scopus 로고    scopus 로고
    • Usable security why do we need it? How do we get it?
    • Cranor, L.F. and Garfinkel, S. (Ed), O' Reilly Media Inc., Sebastopol, CA
    • Sasse, M. and Flechais, I. (2005), "Usable Security Why do we need it? How do we get it?", in Cranor, L.F. and Garfinkel, S. (Ed), Security and Usability: Designing Secure Systems That People Can Use, O' Reilly Media Inc., Sebastopol, CA. ISBN: 0-596-00827-9.
    • (2005) Security and Usability: Designing Secure Systems That People Can Use
    • Sasse, M.1    Flechais, I.2
  • 10
    • 77956357772 scopus 로고    scopus 로고
    • Why johnny can't encrypt: A usability evaluation of PGP 5.0
    • Cranor, L.F. and Garfinkel, S. (Ed), O' Reilly Media Inc., Sebastopol, CA
    • Whitten, A. and Tygar, J.D. (2005), "Why Johnny can't encrypt: A usability evaluation of PGP 5.0", in Cranor, L.F. and Garfinkel, S. (Ed), Security and Usability: Designing Secure Systems That People Can Use, O' Reilly Media Inc., Sebastopol, CA. ISBN: 0-596-00827-9.
    • (2005) Security and Usability: Designing Secure Systems That People Can Use
    • Whitten, A.1    Tygar, J.D.2
  • 11
    • 0038343292 scopus 로고    scopus 로고
    • Why and when five test users aren't enough
    • Vanderdonckt, J., Blandford, A. and Derycke, A. (Ed), Toulouse, France
    • Woolrych, A. and Cockton, G. (2001), "Why and when five test users aren't enough", in Vanderdonckt, J., Blandford, A. and Derycke, A. (Ed), in proceedings of IHM-HCI 2001, Toulouse, France, Vol. 2, pp105-108.
    • (2001) Proceedings of IHM-HCI 2001 , vol.2 , pp. 105-108
    • Woolrych, A.1    Cockton, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.