Computer security impaired by legitimate users

[1]  David Greathead,et al.  A cognitive approach to safe violations , 2003, Cognition, Technology & Work.

[2]  Eric Rescorla Security Holes . . . Who Cares? , 2003, USENIX Security Symposium.

[3]  S. Dekker Failure to adapt or adaptations that fail: contrasting models on procedures and safety. , 2003, Applied ergonomics.

[4]  Sacha Brostoff,et al.  “Ten strikes and you're out”: Increasing the number of login attempts can improve password usability , 2003 .

[5]  Andrew S. Patrick,et al.  HCI and security systems , 2003, CHI Extended Abstracts.

[6]  Martina Angela Sasse Computer Security: Anatomy of a Usability Disaster, and a Plan for Recovery , 2003 .

[7]  Budi Arief,et al.  Technical and Human Issues in Computer-Based Systems Security , 2003 .

[8]  Rebecca E. Grinter Three Challenges for Embedding Security into Applications , 2003 .

[9]  P. Dourish,et al.  Security as a Practical Problem: Some Preliminary Observations of Everyday Mental Models , 2003 .

[10]  Ka-Ping Yee,et al.  User Interaction Design for Secure Systems , 2002, ICICS.

[11]  James Lee,et al.  Hacking Linux Exposed: Linux Security Secrets & Solutions , 2002 .

[12]  Felix Redmill,et al.  Some dimensions of risk not often considered by engineers , 2002 .

[13]  Helen Nissenbaum,et al.  Users' conceptions of web security: a comparative study , 2002, CHI Extended Abstracts.

[14]  Jianyi Lin,et al.  Computer crime and security survey , 2002 .

[15]  Sarah Gordon,et al.  Cyberterrorism? , 2002, Comput. Secur..

[16]  M. Angela Sasse,et al.  Pretty good persuasion: a first step towards effective password security in the real world , 2001, NSPW '01.

[17]  M. Angela Sasse,et al.  Safe and sound: a safety-critical approach to security , 2001, NSPW '01.

[18]  William L. Simon,et al.  The Art of Deception: Controlling the Human Element of Security , 2001 .

[19]  Sacha Brostoff,et al.  Transforming the ‘Weakest Link’ — a Human/Computer Interaction Approach to Usable and Effective Security , 2001 .

[20]  Saumil Shah,et al.  Hacking Linux Exposed , 2001 .

[21]  H. V. Jagadish,et al.  Information warfare and security , 1998, SGMD.

[22]  Yushi Fujita,et al.  Actualities Need to be Captured , 2000, Cognition, Technology & Work.

[23]  Kazuo Furuta,et al.  Human Factor Analysis of JCO Criticality Accident , 2000, Cognition, Technology & Work.

[24]  Debbie Richards,et al.  The reuse of knowledge: a user-centred approach , 2000, Int. J. Hum. Comput. Stud..

[25]  Gilbert Cockton,et al.  People and Computers XIV — Usability or Else! , 2000, Springer London.

[26]  Benjamin M. Compaine,et al.  The Internet upheaval : raising questions, seeking answers in communications policy , 2000 .

[27]  H. Summerton Who cares? , 2000, Nursing times.

[28]  M. Angela Sasse,et al.  Are Passfaces More Usable Than Passwords? A Field Trial Investigation , 2000, BCS HCI.

[29]  M. Angela Sasse,et al.  Users are not the enemy , 1999, CACM.

[30]  Paul A. Taylor,et al.  Hackers: Crime in the Digital Sublime , 1999 .

[31]  George Kurtz,et al.  Hacking Exposed: Network Security Secrets & Solutions , 1999 .

[32]  Stuart McClure,et al.  Hacking Exposed; Network Security Secrets and Solutions , 1999 .

[33]  Michael K. Reiter,et al.  The Design and Analysis of Graphical Passwords , 1999, USENIX Security Symposium.

[34]  J. Doug Tygar,et al.  Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 , 1999, USENIX Security Symposium.

[35]  Mark S. Ackerman,et al.  Privacy critics: UI components to safeguard users' privacy , 1999, CHI Extended Abstracts.

[36]  Mark S. Ackerman,et al.  Beyond Concern: Understanding Net Users' Attitudes About Online Privacy , 1999, ArXiv.

[37]  Rune Gustavsson,et al.  Agents with power , 1999, CACM.

[38]  William Mackaness,et al.  Human-Computer Interaction: INTERACT'99 , 1999 .

[39]  M. Angela Sasse,et al.  Privacy Issues in Ubiquitous Multimedia Environments: Wake Sleeping Dogs, or Let Them Lie? , 1999, INTERACT.

[40]  U. Holmström User-centered design of secure software , 1999 .

[41]  J. D. Tygar,et al.  Usability of Security: A Case Study, , 1998 .

[42]  Hélène Veyrac,et al.  Modele de l'operateur et modele du prescripteur : le cas des consignes de resolution de situations incidentelles pour les conducteurs de trains , 1997 .

[43]  M. Angela Sasse,et al.  Making Passwords Secure and Usable , 1997, BCS HCI.

[44]  Mary Ellen Zurko,et al.  User-centered security , 1996, NSPW '96.

[45]  C. Harries,et al.  General practitioners' tacit and stated policies in the prescription of lipid lowering agents. , 1995, The British journal of general practice : the journal of the Royal College of General Practitioners.

[46]  Izak Benbasat,et al.  The influence of decision aids on choice strategies under conditions of high cognitive load , 1994, IEEE Trans. Syst. Man Cybern..

[47]  Nancy G. Leveson,et al.  High-pressure steam engines and computer software , 1992, Computer.

[48]  J. Hoc,et al.  Diagnostic et prise de décision dans les situations dynamiques , 1994 .

[49]  Clive Davidson,et al.  Cyberpunk: Outlaws and hackers on the computer frontier , 1992 .

[50]  Herbert A. Simon,et al.  Optimal probe selection in diagnostic search , 1990, IEEE Trans. Syst. Man Cybern..

[51]  Giuseppe Mancini,et al.  Commentary: Models of the Decision Maker in Unforeseen Accidents , 1987, Int. J. Man Mach. Stud..

[52]  P. Kline Models of man , 1986, Nature.

[53]  Les Gasser,et al.  The integration of computing and routine work , 1986, TOIS.

[54]  Ray A. Jarvis A Simple Hand/Eye Experimental Set-up for Computer Vision Research , 1977, Computer.

[55]  J. Shaoul Human Error , 1973, Nature.

[56]  H. Simon,et al.  Models of Man. , 1957 .