메뉴 건너뛰기




Volumn , Issue , 2016, Pages 43-53

Combining qualitative coding and sentiment analysis: Deconstructing perceptions of usable security in organisations

Author keywords

[No Author keywords available]

Indexed keywords

ECONOMIC AND SOCIAL EFFECTS; SENTIMENT ANALYSIS;

EID: 85075913934     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (6)

References (28)
  • 1
    • 0043232732 scopus 로고    scopus 로고
    • Users are not the enemy
    • Adams, A., and Sasse, M. A. Users are not the enemy. Commun ACM, 42(12), 1999: 40-46.
    • (1999) Commun ACM , vol.42 , Issue.12 , pp. 40-46
    • Adams, A.1    Sasse, M. A.2
  • 2
    • 84888884622 scopus 로고    scopus 로고
    • CISOs and organisational culture: their own worst enemy?
    • Part B
    • Ashenden, D., and Sasse, M. A. CISOs and organisational culture: their own worst enemy? Computers & Security, 39, Part B, 2013: 396-405.
    • (2013) Computers & Security , vol.39 , pp. 396-405
    • Ashenden, D.1    Sasse, M. A.2
  • 3
    • 85091936914 scopus 로고    scopus 로고
    • ATLAS.ti GmbH. ATLAS.ti. Berlin
    • ATLAS.ti GmbH. ATLAS.ti. Berlin, 2013.
    • (2013)
  • 4
    • 30344451986 scopus 로고    scopus 로고
    • Valence is a basic building block of emotional life
    • Barrett, L. F. Valence is a basic building block of emotional life. J Res Pers, 40(1), 2006: 35-55.
    • (2006) J Res Pers , vol.40 , Issue.1 , pp. 35-55
    • Barrett, L. F.1
  • 5
    • 84892849335 scopus 로고    scopus 로고
    • How users bypass access control and why: the impact of authorization problems on individuals and the organization
    • Paper 402
    • Bartsch, S., and Sasse, M. A. How users bypass access control and why: the impact of authorization problems on individuals and the organization. Proceedings of the 21st European Conference on Information Systems. 2013, Paper 402.
    • (2013) Proceedings of the 21st European Conference on Information Systems
    • Bartsch, S.1    Sasse, M. A.2
  • 6
    • 77950564668 scopus 로고    scopus 로고
    • The compliance budget: managing security behaviour in organisations
    • Beautement, A., Sasse, M. A., and Wonham, M. The compliance budget: managing security behaviour in organisations Proc. NSPW'08, 47-58.
    • Proc. NSPW'08 , pp. 47-58
    • Beautement, A.1    Sasse, M. A.2    Wonham, M.3
  • 7
    • 84959257468 scopus 로고    scopus 로고
    • Maybe Poor Johnny Really Cannot Encrypt: The Case for a Complexity Theory for Usable Security Proc
    • Benenson, Z., Lenzini, G., Oliveira, D., Parkin, S., and Uebelacker, S. Maybe Poor Johnny Really Cannot Encrypt: The Case for a Complexity Theory for Usable Security Proc. NSPW'15, 85-99.
    • NSPW'15 , pp. 85-99
    • Benenson, Z.1    Lenzini, G.2    Oliveira, D.3    Parkin, S.4    Uebelacker, S.5
  • 10
    • 0001463960 scopus 로고
    • Measuring agreement for multinomial data
    • Davies, M., and Fleiss, J. L. Measuring agreement for multinomial data. Biometrics, 38(4), 1982: 1047-1051.
    • (1982) Biometrics , vol.38 , Issue.4 , pp. 1047-1051
    • Davies, M.1    Fleiss, J. L.2
  • 11
    • 2142668188 scopus 로고    scopus 로고
    • The kappa statistic: a second look
    • Di Eugenio, B., and Glass, M. The kappa statistic: a second look. Comput. Ling. 30(1), 2004: 95-101.
    • (2004) Comput. Ling , vol.30 , Issue.1 , pp. 95-101
    • Di Eugenio, B.1    Glass, M.2
  • 12
    • 3343019470 scopus 로고
    • Measuring nominal scale agreement among many raters
    • Fleiss, J. L. Measuring nominal scale agreement among many raters. Psychol Bull, 76(5), 1971: 378-382.
    • (1971) Psychol Bull , vol.76 , Issue.5 , pp. 378-382
    • Fleiss, J. L.1
  • 14
    • 84993763129 scopus 로고    scopus 로고
    • Mapping the process: an exemplar of process and challenge in grounded theory analysis
    • Harry, B., Sturges, K. M., and Klingner, J. K. Mapping the process: an exemplar of process and challenge in grounded theory analysis. Educational Researcher, 34(2), 2005: 3-13.
    • (2005) Educational Researcher , vol.34 , Issue.2 , pp. 3-13
    • Harry, B.1    Sturges, K. M.2    Klingner, J. K.3
  • 15
    • 84903690941 scopus 로고    scopus 로고
    • Learning from “shadow security”: why understanding non-compliance provides the basis for effective security
    • Kirlappos, I., Parkin, S., and Sasse, M. A. Learning from “shadow security”: why understanding non-compliance provides the basis for effective security. Proc. USEC. 2014.
    • (2014) Proc. USEC
    • Kirlappos, I.1    Parkin, S.2    Sasse, M. A.3
  • 16
    • 84937297201 scopus 로고
    • On the reliability of unitizing continuous data
    • Krippendorff, K. On the reliability of unitizing continuous data. Sociol Methodol, 25, 1995: 47-76.
    • (1995) Sociol Methodol , vol.25 , pp. 47-76
    • Krippendorff, K.1
  • 19
    • 84861101642 scopus 로고    scopus 로고
    • Leveraging behavioral science to mitigate cyber security risk
    • Pfleeger, S. L., and Caputo, D. D. Leveraging behavioral science to mitigate cyber security risk. Computers & Security, 31(4), 2012: 597-611.
    • (2012) Computers & Security , vol.31 , Issue.4 , pp. 597-611
    • Pfleeger, S. L.1    Caputo, D. D.2
  • 20
    • 85091891956 scopus 로고    scopus 로고
    • Studying usable security: how to design and conduct case study
    • Pfleeger, S. L., and Sasse, M. A. Studying usable security: how to design and conduct case study. under Review. 2016.
    • (2016) under Review
    • Pfleeger, S. L.1    Sasse, M. A.2
  • 23
    • 21144461349 scopus 로고
    • Gender, context, and expression of positive emotion
    • Stoppard, J. M., and Gruchy, C. D. G. Gender, context, and expression of positive emotion. Pers Soc Psychol Bull, 19(2), 1993: 143-150.
    • (1993) Pers Soc Psychol Bull , vol.19 , Issue.2 , pp. 143-150
    • Stoppard, J. M.1    Gruchy, C. D. G.2
  • 24
    • 56749156881 scopus 로고    scopus 로고
    • Learning to identify emotions in text
    • Strapparava, C., and Mihalcea, R. Learning to identify emotions in text Proc. SAC'08, 1556-60.
    • Proc. SAC'08 , pp. 1556-1560
    • Strapparava, C.1    Mihalcea, R.2
  • 27
    • 79951633637 scopus 로고    scopus 로고
    • Folk models of home computer security
    • 16
    • Wash, R. Folk models of home computer security Proc. SOUPS'10, 11:1-11:16.
    • Proc. SOUPS'10 , vol.11 , pp. 1-11
    • Wash, R.1
  • 28
    • 12844271558 scopus 로고    scopus 로고
    • Aligning security and usability
    • Yee, K.-P. Aligning security and usability. IEEE S&P, 2(5), 2004: 48-55.
    • (2004) IEEE S&P , vol.2 , Issue.5 , pp. 48-55
    • Yee, K.-P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.