Gathering evidence: use of visual security cues in web browsers
暂无分享,去创建一个
[1] M. Angela Sasse,et al. Users are not the enemy , 1999, CACM.
[2] Helen Nissenbaum,et al. Users' conceptions of web security: a comparative study , 2002, CHI Extended Abstracts.
[3] J. Doug Tygar,et al. Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 , 1999, USENIX Security Symposium.
[4] Thomas W. Calvert,et al. Moving Icons: Detection and Distraction , 2001, INTERACT.
[5] Jerome H. Saltzer,et al. The protection of information in computer systems , 1975, Proc. IEEE.
[6] Batya Friedman,et al. Informed consent in the Mozilla browser: implementing value-sensitive design , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.
[7] William Yurcik,et al. Two Visual Computer Network Security Monitoring Tools Incorporating Operator Interface Requirements , 2003 .