An Investigation into the "Other" Barriers to Adoption of Smartphone Security Precautions (Poor Usability being a Given)
暂无分享,去创建一个
[1] Melanie Volkamer,et al. NoPhish: An Anti-Phishing Education App , 2014, STM.
[2] Konstantin Beznosov,et al. Understanding Users' Requirements for Data Protection in Smartphones , 2012, 2012 IEEE 28th International Conference on Data Engineering Workshops.
[3] Matthew Smith,et al. Using personal examples to improve risk communication for security & privacy decisions , 2014, CHI.
[4] Steven Furnell,et al. From desktop to mobile: Examining the security experience , 2009, Comput. Secur..
[5] N D Weinstein,et al. Why it won't happen to me: perceptions of risk factors and susceptibility. , 1984, Health psychology : official journal of the Division of Health Psychology, American Psychological Association.
[6] M. Angela Sasse,et al. Desperately seeking assurances: Segmenting users by their information-seeking preferences , 2014, 2014 Twelfth Annual International Conference on Privacy, Security and Trust.
[7] A. Akande,et al. Black South African Adolescents' Attitudes Towards AIDS Precautions , 1997 .
[8] S. Furnell,et al. Public awareness and perceptions of biometrics , 2007 .
[9] Angela Sasse,et al. Humans in the Loop Human – Computer Interaction and Security , 2022 .
[10] S. Liu,et al. A practical guide to biometric security technology , 2001 .
[11] Ivan Flechais. Usable Security: What Is It? How Do We Get It? , 2005 .
[12] M. Angela Sasse,et al. Pretty good persuasion: a first step towards effective password security in the real world , 2001, NSPW '01.
[13] David A. Wagner,et al. Are You Ready to Lock? , 2014, CCS.
[14] Nick Mathewson,et al. Anonymity Loves Company: Usability and the Network Effect , 2006, WEIS.
[15] Edward W. Felten,et al. Secrecy, flagging, and paranoia: adoption criteria in encrypted email , 2006, CHI.
[16] Melanie Volkamer,et al. Why Doesn't Jane Protect Her Privacy? , 2014, Privacy Enhancing Technologies.
[17] Andra Giurgiu,et al. No Place to Hide – Edward Snowden, the NSA and the Surveillance State , 2015 .
[18] Lorrie Faith Cranor,et al. A Conundrum of Permissions: Installing Applications on an Android Smartphone , 2012, Financial Cryptography Workshops.
[19] Bruce Schneier,et al. The psychology of security , 2007, CACM.
[20] Eirik Albrechtsen,et al. A qualitative study of users' view on information security , 2007, Comput. Secur..
[21] Matthew Smith,et al. Who's Afraid of Which Bad Wolf? A Survey of IT Security Risk Awareness , 2014, 2014 IEEE 27th Computer Security Foundations Symposium.
[22] Matthew Smith,et al. On the Acceptance of Privacy-Preserving Authentication Technology: The Curious Case of National Identity Cards , 2013, Privacy Enhancing Technologies.
[23] Steven Furnell,et al. Security beliefs and barriers for novice Internet users , 2008, Comput. Secur..
[24] Butler W. Lampson. Privacy and securityUsable security , 2009, Commun. ACM.
[25] Norman M. Sadeh,et al. Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing , 2012, UbiComp.
[26] Matt Blaze,et al. Why (Special Agent) Johnny (Still) Can't Encrypt: A Security Analysis of the APCO Project 25 Two-Way Radio System , 2011, USENIX Security Symposium.
[27] Mark Robinson,et al. Exploring end-user smartphone security awareness within a South African context , 2014, 2014 Information Security for South Africa.
[28] J. Doug Tygar,et al. Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 , 1999, USENIX Security Symposium.
[29] Amir Herzberg. Why Johnny can't surf (safely)? Attacks and defenses for web users , 2009, Comput. Secur..
[30] Thomas R. Kochtanek,et al. Success Factors in the Implementation of a Collaborative Technology, and Resulting Productivity Improvements in a Small Business: An Exploratory Study , 2004, J. Organ. End User Comput..
[31] P. Corrigan,et al. At issue: Stop the stigma: call mental illness a brain disease. , 2004, Schizophrenia bulletin.
[32] Sebastian Günther. Folk Models of Home Computer Security , 2012 .
[33] Marco R. Spruit,et al. Information Security in Health Care - Evaluation with Health Professionals , 2011, HEALTHINF.
[34] Melanie Volkamer,et al. What Deters Jane from Preventing Identification and Tracking on the Web? , 2014, WPES.
[35] George R. S. Weir,et al. Perceived risk and sensitive data on mobile devices , 2011 .
[36] David A. Wagner,et al. I've got 99 problems, but vibration ain't one: a survey of smartphone users' concerns , 2012, SPSM '12.
[37] Vyas Sekar,et al. Measuring user confidence in smartphone security and privacy , 2012, SOUPS.
[38] Alexander De Luca,et al. It's a Hard Lock Life: A Field Study of Smartphone (Un)Locking Behavior and Risk Perception , 2014, SOUPS.
[39] Tejaswini Herath,et al. Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness , 2009, Decis. Support Syst..
[40] Daniel J. Solove. 'I've Got Nothing to Hide' and Other Misunderstandings of Privacy , 2007 .
[41] Alastair R. Beresford,et al. MockDroid: trading privacy for application functionality on smartphones , 2011, HotMobile '11.
[42] Ramakrishnan Raman,et al. A Study on the User Perception and Awareness of Smartphone Security , 2014 .
[43] Bernhard Debatin,et al. Facebook and Online Privacy: Attitudes, Behaviors, and Unintended Consequences , 2009, J. Comput. Mediat. Commun..