Pretty good persuasion: a first step towards effective password security in the real world
暂无分享,去创建一个
[1] Ian Wakeman,et al. Examining Users' Repertoire of Internet Applications , 1999, INTERACT.
[2] J. Potter,et al. Discourse and Social Psychology: Beyond Attitudes and Behaviour , 1987 .
[3] J. Doug Tygar,et al. Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 , 1999, USENIX Security Symposium.
[4] Mark S. Ackerman,et al. Usability and Security , 1999, NDSS.
[5] U. Holmström. User-centered design of secure software , 1999 .
[6] John J. McGonagle. Corporate espionage: What it is, why it's happening in your company, what you must do about it , 1997 .
[7] R. Rogers. Cognitive and physiological processes in fear appeals and attitude change: a revised theory of prote , 1983 .
[8] M. Angela Sasse,et al. Users are not the enemy , 1999, CACM.
[9] Sacha Brostoff,et al. Transforming the ‘Weakest Link’ — a Human/Computer Interaction Approach to Usable and Effective Security , 2001 .
[10] Mary Ellen Zurko,et al. User-centered security , 1996, NSPW '96.
[11] M. Angela Sasse,et al. Making Passwords Secure and Usable , 1997, BCS HCI.