Privacy and Security in the Brave New World: The Use of Multiple Mental Models
暂无分享,去创建一个
[1] L. Jean Camp,et al. Mental Models of Security Risks , 2007, Financial Cryptography.
[2] L. Hoffman. Computers and Privacy in the Next Decade , 1980 .
[3] Rick Wash,et al. Organization Interfaces—collaborative computing General Terms , 2022 .
[4] Kim Sheehan,et al. Toward a Typology of Internet Users and Online Privacy Concerns , 2002, Inf. Soc..
[5] Daniel J. Hruschka,et al. Reliability in Coding Open-Ended Data: Lessons Learned from HIV Behavioral Research , 2004 .
[6] ชวิตรา ตันติมาลา. Constructing Grounded Theory: A Practical Guide through Qualitative Analysis , 2017 .
[7] K. Charmaz,et al. Constructing Grounded Theory: A practical guide through qualitative analysis Kathy Charmaz Constructing Grounded Theory: A practical guide through qualitative analysis Sage 224 £19.99 0761973532 0761973532 [Formula: see text]. , 2006, Nurse researcher.
[8] L. Jean Camp,et al. Mental Models of Computer Security Risks , 2007, WEIS.
[9] David Hutton,et al. Lessons Unlearnt: The (Human) Nature of Disaster Management , 2012 .
[10] Ruth Urner,et al. Naïve Security in a Wi-Fi World , 2010, IFIPTM.
[11] L. Jean Camp,et al. Mental models of privacy and security , 2009, IEEE Technology and Society Magazine.
[12] Paul Dourish,et al. Collective Information Practice: Exploring Privacy and Security as Social and Cultural Phenomena , 2006, Hum. Comput. Interact..
[13] A. Clement,et al. Situating Privacy Online , 2004 .
[14] J. Rubenfeld. The Right of Privacy , 1989 .
[15] Yee-Yin Choong,et al. Basing Cybersecurity Training on User Perceptions , 2012, IEEE Security & Privacy.
[16] Louis D. Brandeis,et al. The Right to Privacy , 1890 .
[17] Paul Dourish,et al. Security in the wild: user strategies for managing security as an everyday, practical problem , 2004, Personal and Ubiquitous Computing.
[18] F. Schoeman,et al. Philosophical Dimensions of Privacy , 1984 .