-
2
-
-
84862466733
-
UNiX security: Threats and solutions
-
Presentation to March At
-
Matt Bishop. UNIX Security: Threats and Solutions. Presentation to SHARE 86.0, March 1996. At http://seclab.cs.ucdavis.edu/~bishop/scriv/1996-share86.pdf.
-
(1996)
SHARE 86.0
-
-
Bishop, M.1
-
4
-
-
0003501701
-
-
The Economist. May 1
-
The Economist. The End of Privacy. May 1, 1999, pages 21-23.
-
(1999)
The End of Privacy
, pp. 21-23
-
-
-
7
-
-
85077732079
-
Evaluating a multimedia authoring tool with cognitive walkthrough and think-aloud user studies
-
John, B. E., & Mashyna, M. M. (1997) Evaluating a Multimedia Authoring Tool with Cognitive Walkthrough and Think-Aloud User Studies. In Journal of the American Society of Information Science, 48 (9).
-
(1997)
Journal of the American Society of Information Science
, vol.48
, Issue.9
-
-
John, B.E.1
Mashyna, M.M.2
-
12
-
-
85077734055
-
-
Published on the web in July at
-
The Open Group Research Institute. Adage System Overview. Published on the web in July 1998 at http://www.osf.org/www/adage/relatedwork.htm
-
(1998)
Adage System Overview
-
-
-
13
-
-
85077756556
-
-
Published in at
-
Pretty Good Privacy, Inc. PGP 5.0 Features and Benefits. Published in 1997 at http://pgp.com/products/PGP50-fab.cgi
-
(1997)
PGP 5.0 Features and Benefits
-
-
-
14
-
-
85077738369
-
-
Pretty Good Privacy, Inc. Version 5.0 for the Mac OS. Packaged with software
-
Pretty Good Privacy, Inc. User’s Guide for PGP for Personal Privacy, Version 5.0 for the Mac OS. Packaged with software, 1997.
-
(1997)
User’S Guide for PGP for Personal Privacy
-
-
-
16
-
-
0026986864
-
Access control for collaborative environments
-
HongHai Shen and Prasun Dewan. Access Control for Collaborative Environments. In Proceedings of CSCW’92.
-
Proceedings of CSCW’92
-
-
Shen, H.1
Dewan, P.2
-
17
-
-
0001436725
-
The cognitive walkthrough method: A practioner’s guide
-
John Wiley & Sons, Inc
-
Cathleen Wharton, John Rieman, Clayton Lewis and Peter Polson. The Cognitive Walkthrough Method: A Practioner’s Guide. InUsability Inspection Methods, John Wiley & Sons, Inc., 1994.
-
(1994)
InUsability Inspection Methods
-
-
Wharton, C.1
Rieman, J.2
Lewis, C.3
Polson, P.4
-
18
-
-
2342492219
-
-
Carnegie Mellon University School of Computer Science Technical Report CMU-CS-98-155, December
-
Alma Whitten and J.D. Tygar. Usability of Security: A Case Study. Carnegie Mellon University School of Computer Science Technical Report CMU-CS-98-155, December 1998. ftp://reports-archive.adm.cs.cmu.edu/1998/CMU-CS-98-155.ps
-
(1998)
Usability of Security: A Case Study
-
-
Whitten, A.1
Tygar, J.D.2
-
19
-
-
0028010070
-
Enhancing warning compliance through alternative product label designs
-
Wogalter, M. S., & Young, S. L. (1994). Enhancing warning compliance through alternative product label designs. Applied Ergonomics, 25, 53-57.
-
(1994)
Applied Ergonomics
, vol.25
, pp. 53-57
-
-
Wogalter, M.S.1
Young, S.L.2
|