User interface dependability through goal-error prevention
暂无分享,去创建一个
[1] J. Shaoul. Human Error , 1973, Nature.
[2] Erik Hollnagel,et al. Cognitive Systems Engineering: New wine in new bottles , 1999, Int. J. Hum. Comput. Stud..
[3] Michael D. Harrison,et al. THEA: A Technique for Human Error Assessment Early in Design , 2001, INTERACT.
[4] Jens Rasmussen,et al. Cognitive Systems Engineering , 2022 .
[5] Greg Ganger,et al. A Prototype User Interface for Coarse-Grained Desktop Access Control (CMU-CS-03-200) , 2003 .
[6] M. Angela Sasse,et al. Users are not the enemy , 1999, CACM.
[7] Roy H. Campbell,et al. Access control for Active Spaces , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..
[8] Gary Herrin,et al. A guide to practical human reliability assessment , 1996 .
[9] J. Doug Tygar,et al. Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 , 1999, USENIX Security Symposium.
[10] Nathaniel Good,et al. Usability and privacy: a study of Kazaa P2P file-sharing , 2003, CHI '03.
[11] K. A. Ericsson,et al. Protocol Analysis: Verbal Reports as Data , 1984 .
[12] Ka-Ping Yee,et al. User Interaction Design for Secure Systems , 2002, ICICS.
[13] John W. Senders,et al. Human Error: Cause, Prediction, and Reduction , 1991 .
[14] Mary Ellen Zurko,et al. A user-centered, modular authorization service built on an RBAC foundation , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[15] Colin Potts,et al. Design of Everyday Things , 1988 .
[16] Prasun Dewan,et al. Controlling access in multiuser interfaces , 1998, TCHI.
[17] Dirk Balfanz. Usable access control for the World Wide Web , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..
[18] Mary Ellen Zurko,et al. User-centered security , 1996, NSPW '96.
[19] Ganesh S. Oak. Information Visualization Introduction , 2022 .
[20] Scott A. Shappell,et al. A HUMAN ERROR APPROACH TO AVIATION ACCIDENT ANALYSIS , 2003 .
[21] Budi Arief,et al. Computer security impaired by legitimate users , 2004, Comput. Secur..
[22] E. M. Roth,et al. Chapter 1 – Cognitive Systems Engineering , 1988 .