-
1
-
-
0043232732
-
Users are not the enemy
-
Adams, A., and Sasse, M. A. Users are not the enemy. Commun ACM, 42(12), 1999: 40-46.
-
(1999)
Commun ACM
, vol.42
, Issue.12
, pp. 40-46
-
-
Adams, A.1
Sasse, M. A.2
-
2
-
-
84888884622
-
CISOs and organisational culture: their own worst enemy?
-
Part B
-
Ashenden, D., and Sasse, M. A. CISOs and organisational culture: their own worst enemy? Computers & Security, 39, Part B, 2013: 396-405.
-
(2013)
Computers & Security
, vol.39
, pp. 396-405
-
-
Ashenden, D.1
Sasse, M. A.2
-
3
-
-
85091936914
-
-
ATLAS.ti GmbH. ATLAS.ti. Berlin
-
ATLAS.ti GmbH. ATLAS.ti. Berlin, 2013.
-
(2013)
-
-
-
4
-
-
30344451986
-
Valence is a basic building block of emotional life
-
Barrett, L. F. Valence is a basic building block of emotional life. J Res Pers, 40(1), 2006: 35-55.
-
(2006)
J Res Pers
, vol.40
, Issue.1
, pp. 35-55
-
-
Barrett, L. F.1
-
5
-
-
84892849335
-
How users bypass access control and why: the impact of authorization problems on individuals and the organization
-
Paper 402
-
Bartsch, S., and Sasse, M. A. How users bypass access control and why: the impact of authorization problems on individuals and the organization. Proceedings of the 21st European Conference on Information Systems. 2013, Paper 402.
-
(2013)
Proceedings of the 21st European Conference on Information Systems
-
-
Bartsch, S.1
Sasse, M. A.2
-
6
-
-
77950564668
-
The compliance budget: managing security behaviour in organisations
-
Beautement, A., Sasse, M. A., and Wonham, M. The compliance budget: managing security behaviour in organisations Proc. NSPW'08, 47-58.
-
Proc. NSPW'08
, pp. 47-58
-
-
Beautement, A.1
Sasse, M. A.2
Wonham, M.3
-
7
-
-
84959257468
-
Maybe Poor Johnny Really Cannot Encrypt: The Case for a Complexity Theory for Usable Security Proc
-
Benenson, Z., Lenzini, G., Oliveira, D., Parkin, S., and Uebelacker, S. Maybe Poor Johnny Really Cannot Encrypt: The Case for a Complexity Theory for Usable Security Proc. NSPW'15, 85-99.
-
NSPW'15
, pp. 85-99
-
-
Benenson, Z.1
Lenzini, G.2
Oliveira, D.3
Parkin, S.4
Uebelacker, S.5
-
8
-
-
85091923177
-
Barriers to usable security: three organizational case studies
-
Caputo, D., Pfleeger, S., Sasse, A., Ammann, P., and Offutt, J. Barriers to usable security: three organizational case studies. under Review. 2016.
-
(2016)
under Review
-
-
Caputo, D.1
Pfleeger, S.2
Sasse, A.3
Ammann, P.4
Offutt, J.5
-
9
-
-
84903727041
-
Compositional security modelling
-
Ed. by T. Tryfonas and I. Askoxylakis. LNCS. Springer
-
Caulfield, T., Pym, D., and Williams, J. Compositional security modelling. In: Human Aspects of Information Security, Privacy, and Trust. Ed. by T. Tryfonas and I. Askoxylakis. Vol. 8533. LNCS. Springer, 2014, 233-245.
-
(2014)
Human Aspects of Information Security, Privacy, and Trust
, vol.8533
, pp. 233-245
-
-
Caulfield, T.1
Pym, D.2
Williams, J.3
-
10
-
-
0001463960
-
Measuring agreement for multinomial data
-
Davies, M., and Fleiss, J. L. Measuring agreement for multinomial data. Biometrics, 38(4), 1982: 1047-1051.
-
(1982)
Biometrics
, vol.38
, Issue.4
, pp. 1047-1051
-
-
Davies, M.1
Fleiss, J. L.2
-
11
-
-
2142668188
-
The kappa statistic: a second look
-
Di Eugenio, B., and Glass, M. The kappa statistic: a second look. Comput. Ling. 30(1), 2004: 95-101.
-
(2004)
Comput. Ling
, vol.30
, Issue.1
, pp. 95-101
-
-
Di Eugenio, B.1
Glass, M.2
-
12
-
-
3343019470
-
Measuring nominal scale agreement among many raters
-
Fleiss, J. L. Measuring nominal scale agreement among many raters. Psychol Bull, 76(5), 1971: 378-382.
-
(1971)
Psychol Bull
, vol.76
, Issue.5
, pp. 378-382
-
-
Fleiss, J. L.1
-
14
-
-
84993763129
-
Mapping the process: an exemplar of process and challenge in grounded theory analysis
-
Harry, B., Sturges, K. M., and Klingner, J. K. Mapping the process: an exemplar of process and challenge in grounded theory analysis. Educational Researcher, 34(2), 2005: 3-13.
-
(2005)
Educational Researcher
, vol.34
, Issue.2
, pp. 3-13
-
-
Harry, B.1
Sturges, K. M.2
Klingner, J. K.3
-
15
-
-
84903690941
-
Learning from “shadow security”: why understanding non-compliance provides the basis for effective security
-
Kirlappos, I., Parkin, S., and Sasse, M. A. Learning from “shadow security”: why understanding non-compliance provides the basis for effective security. Proc. USEC. 2014.
-
(2014)
Proc. USEC
-
-
Kirlappos, I.1
Parkin, S.2
Sasse, M. A.3
-
16
-
-
84937297201
-
On the reliability of unitizing continuous data
-
Krippendorff, K. On the reliability of unitizing continuous data. Sociol Methodol, 25, 1995: 47-76.
-
(1995)
Sociol Methodol
, vol.25
, pp. 47-76
-
-
Krippendorff, K.1
-
17
-
-
85035757758
-
SemEval-2013 task 2: sentiment analysis in twitter
-
Nakov, P., Rosenthal, S., Kozareva, Z., Stoyanov, V., Ritter, A., and Wilson, T. SemEval-2013 task 2: sentiment analysis in twitter. Proc. SemEval. 2013, 312-320.
-
(2013)
Proc. SemEval
, pp. 312-320
-
-
Nakov, P.1
Rosenthal, S.2
Kozareva, Z.3
Stoyanov, V.4
Ritter, A.5
Wilson, T.6
-
19
-
-
84861101642
-
Leveraging behavioral science to mitigate cyber security risk
-
Pfleeger, S. L., and Caputo, D. D. Leveraging behavioral science to mitigate cyber security risk. Computers & Security, 31(4), 2012: 597-611.
-
(2012)
Computers & Security
, vol.31
, Issue.4
, pp. 597-611
-
-
Pfleeger, S. L.1
Caputo, D. D.2
-
20
-
-
85091891956
-
Studying usable security: how to design and conduct case study
-
Pfleeger, S. L., and Sasse, M. A. Studying usable security: how to design and conduct case study. under Review. 2016.
-
(2016)
under Review
-
-
Pfleeger, S. L.1
Sasse, M. A.2
-
21
-
-
84903957235
-
Why doesn't jane protect her privacy?
-
Renaud, K., Volkamer, M., and Renkema-Padmos, A. Why doesn't jane protect her privacy? Privacy Enhancing Technologies. 2014, 244-262.
-
(2014)
Privacy Enhancing Technologies
, pp. 244-262
-
-
Renaud, K.1
Volkamer, M.2
Renkema-Padmos, A.3
-
23
-
-
21144461349
-
Gender, context, and expression of positive emotion
-
Stoppard, J. M., and Gruchy, C. D. G. Gender, context, and expression of positive emotion. Pers Soc Psychol Bull, 19(2), 1993: 143-150.
-
(1993)
Pers Soc Psychol Bull
, vol.19
, Issue.2
, pp. 143-150
-
-
Stoppard, J. M.1
Gruchy, C. D. G.2
-
25
-
-
0037941821
-
-
Thousand Oaks, CA, US: Sage Publications
-
Strauss, A., and Corbin, J. M. Basics of qualitative research: grounded theory procedures and techniques. Thousand Oaks, CA, US: Sage Publications, 1990.
-
(1990)
Basics of qualitative research: grounded theory procedures and techniques
-
-
Strauss, A.1
Corbin, J. M.2
-
26
-
-
78449308783
-
Sentiment strength detection in short informal text
-
Thelwall, M., Buckley, K., Paltoglou, G., Cai, D., and Kappas, A. Sentiment strength detection in short informal text. J. Am. Soc. Inf. Sci. 61(12), 2010: 2544-2558.
-
(2010)
J. Am. Soc. Inf. Sci
, vol.61
, Issue.12
, pp. 2544-2558
-
-
Thelwall, M.1
Buckley, K.2
Paltoglou, G.3
Cai, D.4
Kappas, A.5
-
27
-
-
79951633637
-
Folk models of home computer security
-
16
-
Wash, R. Folk models of home computer security Proc. SOUPS'10, 11:1-11:16.
-
Proc. SOUPS'10
, vol.11
, pp. 1-11
-
-
Wash, R.1
-
28
-
-
12844271558
-
Aligning security and usability
-
Yee, K.-P. Aligning security and usability. IEEE S&P, 2(5), 2004: 48-55.
-
(2004)
IEEE S&P
, vol.2
, Issue.5
, pp. 48-55
-
-
Yee, K.-P.1
|