Computer security impaired by legitimate users
暂无分享,去创建一个
[1] David Greathead,et al. A cognitive approach to safe violations , 2003, Cognition, Technology & Work.
[2] Eric Rescorla. Security Holes . . . Who Cares? , 2003, USENIX Security Symposium.
[3] S. Dekker. Failure to adapt or adaptations that fail: contrasting models on procedures and safety. , 2003, Applied ergonomics.
[4] Sacha Brostoff,et al. “Ten strikes and you're out”: Increasing the number of login attempts can improve password usability , 2003 .
[5] Andrew S. Patrick,et al. HCI and security systems , 2003, CHI Extended Abstracts.
[6] Martina Angela Sasse,et al. Computer Security: Anatomy of a Usability Disaster, and a Plan for Recovery , 2003 .
[7] Budi Arief,et al. Technical and Human Issues in Computer-Based Systems Security , 2003 .
[8] Rebecca E. Grinter. Three Challenges for Embedding Security into Applications , 2003 .
[9] P. Dourish,et al. Security as a Practical Problem: Some Preliminary Observations of Everyday Mental Models , 2003 .
[10] Ka-Ping Yee,et al. User Interaction Design for Secure Systems , 2002, ICICS.
[11] James Lee,et al. Hacking Linux Exposed: Linux Security Secrets & Solutions , 2002 .
[12] Felix Redmill,et al. Some dimensions of risk not often considered by engineers , 2002 .
[13] Helen Nissenbaum,et al. Users' conceptions of web security: a comparative study , 2002, CHI Extended Abstracts.
[14] Jianyi Lin,et al. Computer crime and security survey , 2002 .
[15] Sarah Gordon,et al. Cyberterrorism? , 2002, Comput. Secur..
[16] M. Angela Sasse,et al. Pretty good persuasion: a first step towards effective password security in the real world , 2001, NSPW '01.
[17] M. Angela Sasse,et al. Safe and sound: a safety-critical approach to security , 2001, NSPW '01.
[18] William L. Simon,et al. The Art of Deception: Controlling the Human Element of Security , 2001 .
[19] Sacha Brostoff,et al. Transforming the ‘Weakest Link’ — a Human/Computer Interaction Approach to Usable and Effective Security , 2001 .
[20] Saumil Shah,et al. Hacking Linux Exposed , 2001 .
[21] H. V. Jagadish,et al. Information warfare and security , 1998, SGMD.
[22] Yushi Fujita,et al. Actualities Need to be Captured , 2000, Cognition, Technology & Work.
[23] Kazuo Furuta,et al. Human Factor Analysis of JCO Criticality Accident , 2000, Cognition, Technology & Work.
[24] Debbie Richards,et al. The reuse of knowledge: a user-centred approach , 2000, Int. J. Hum. Comput. Stud..
[25] Gilbert Cockton,et al. People and Computers XIV — Usability or Else! , 2000, Springer London.
[26] Benjamin M. Compaine,et al. The Internet upheaval : raising questions, seeking answers in communications policy , 2000 .
[27] H. Summerton. Who cares? , 2000, Nursing times.
[28] M. Angela Sasse,et al. Are Passfaces More Usable Than Passwords? A Field Trial Investigation , 2000, BCS HCI.
[29] M. Angela Sasse,et al. Users are not the enemy , 1999, CACM.
[30] Paul A. Taylor,et al. Hackers: Crime in the Digital Sublime , 1999 .
[31] George Kurtz,et al. Hacking Exposed: Network Security Secrets & Solutions , 1999 .
[32] Stuart McClure,et al. Hacking Exposed; Network Security Secrets and Solutions , 1999 .
[33] Michael K. Reiter,et al. The Design and Analysis of Graphical Passwords , 1999, USENIX Security Symposium.
[34] J. Doug Tygar,et al. Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 , 1999, USENIX Security Symposium.
[35] Mark S. Ackerman,et al. Privacy critics: UI components to safeguard users' privacy , 1999, CHI Extended Abstracts.
[36] Mark S. Ackerman,et al. Beyond Concern: Understanding Net Users' Attitudes About Online Privacy , 1999, ArXiv.
[37] Rune Gustavsson,et al. Agents with power , 1999, CACM.
[38] William Mackaness,et al. Human-Computer Interaction: INTERACT'99 , 1999 .
[39] M. Angela Sasse,et al. Privacy Issues in Ubiquitous Multimedia Environments: Wake Sleeping Dogs, or Let Them Lie? , 1999, INTERACT.
[40] U. Holmström. User-centered design of secure software , 1999 .
[41] J. D. Tygar,et al. Usability of Security: A Case Study, , 1998 .
[42] Hélène Veyrac,et al. Modele de l'operateur et modele du prescripteur : le cas des consignes de resolution de situations incidentelles pour les conducteurs de trains , 1997 .
[43] M. Angela Sasse,et al. Making Passwords Secure and Usable , 1997, BCS HCI.
[44] Mary Ellen Zurko,et al. User-centered security , 1996, NSPW '96.
[45] C. Harries,et al. General practitioners' tacit and stated policies in the prescription of lipid lowering agents. , 1995, The British journal of general practice : the journal of the Royal College of General Practitioners.
[46] Izak Benbasat,et al. The influence of decision aids on choice strategies under conditions of high cognitive load , 1994, IEEE Trans. Syst. Man Cybern..
[47] Nancy G. Leveson,et al. High-pressure steam engines and computer software , 1992, Computer.
[48] J. Hoc,et al. Diagnostic et prise de décision dans les situations dynamiques , 1994 .
[49] Clive Davidson,et al. Cyberpunk: Outlaws and hackers on the computer frontier , 1992 .
[50] Herbert A. Simon,et al. Optimal probe selection in diagnostic search , 1990, IEEE Trans. Syst. Man Cybern..
[51] Giuseppe Mancini,et al. Commentary: Models of the Decision Maker in Unforeseen Accidents , 1987, Int. J. Man Mach. Stud..
[52] P. Kline. Models of man , 1986, Nature.
[53] Les Gasser,et al. The integration of computing and routine work , 1986, TOIS.
[54] Ray A. Jarvis. A Simple Hand/Eye Experimental Set-up for Computer Vision Research , 1977, Computer.
[55] J. Shaoul. Human Error , 1973, Nature.
[56] H. Simon,et al. Models of Man. , 1957 .