Usability and Security An Appraisal of Usability Issues in Information Security Methods
暂无分享,去创建一个
Gavriel Salvendy | Robert W. Proctor | E. Eugene Schultz | Mei-Ching Lien | G. Salvendy | R. Proctor | M. Lien | E. Schultz | Mei-Ching Lien
[1] E. E. Schultz,et al. A framework for password selection. [Password recommendations] , 1988 .
[2] Said S. Al-Gahtani,et al. Attitudes, satisfaction and usage: Factors contributing to each in the acceptance of information technology , 1999, Behav. Inf. Technol..
[3] Donn B. Parker,et al. Restating the Foundation of Information Security , 1991, SEC.
[4] Dieter Gollmann,et al. Computer Security , 1979, Lecture Notes in Computer Science.
[5] Vijay T. Ahuja. Network and Internet security , 1996 .
[6] T. Landauer,et al. Handbook of Human-Computer Interaction , 1997 .
[7] M. Lynne Markus,et al. Power, politics, and MIS implementation , 1987, CACM.
[8] B. Miller,et al. Vital signs of identity [biometrics] , 1994, IEEE Spectrum.
[9] Macarena Aspillaga. Perceptual foundations in the design of visual displays , 1996 .
[10] Dennis E. Egan,et al. Handbook of Human Computer Interaction , 1988 .
[11] Robert W. Zmud,et al. An attributional explanation of individual resistance to the introduction of information technologies in the workplace , 1996, Behav. Inf. Technol..
[12] Carol A. Siegel,et al. Internet Security for Business , 1996 .
[13] Michael Wagner,et al. User verification through pointing characteristics: an exploration examination , 1996, Int. J. Hum. Comput. Stud..
[14] William N. Dember,et al. VIGILANCE AND WORKLOAD IN AUTOMATED SYSTEMS. , 1996 .
[15] Sharath Pankanti,et al. BIOMETRIC IDENTIFICATION , 2000 .
[16] Gavriel Salvendy,et al. A Task Analysis of Usability in Third-Party Authentication , 2000 .
[17] Agnes Werner,et al. An attributional explanation of individual resistance to the introduction of information technologies in the workplace , 1996, Behav. Inf. Technol..
[18] Robin L. Sherman. Biometrics futures , 1992, Comput. Secur..
[19] Steven M. Bellovin,et al. Network and Internet Security , 1997, Inf. Secur. J. A Glob. Perspect..
[20] Doug Mahar,et al. Theoretical Examination of the Effects of Anxiety and Electronic Performance Monitoring on Behavioural Biometric Security Systems , 1995, Interact. Comput..
[21] Daniel Klein,et al. Foiling the cracker: A survey of, and improvements to, password security , 1992 .
[22] Janet J. Turnage,et al. The challenge of new workplace technology for psychology. , 1990 .
[23] John D. Lee,et al. Book review of Handbook of Human Factors and Ergonomics (2nd ed.) , 1999 .