Even if users do not read security directives, their behavior is not so catastrophic
暂无分享,去创建一个
Vashek Matyas | Kamil Malinka | Lydia Kraus | Agata Kruzikova | Lenka Knapova | Lydia Kraus | L. Knapova | K. Malinka | Agata Kruzikova | Vashek Matyás
[1] Elissa M. Redmiles,et al. How I Learned to be Secure: a Census-Representative Survey of Security Advice Sources and Behavior , 2016, CCS.
[2] Adéle da Veiga,et al. Comparing the information security culture of employees who had read the information security policy and those who had not: Illustrated through an empirical study , 2016, Inf. Comput. Secur..
[3] S. Trauzettel-Klosinski,et al. Standardized assessment of reading performance: the New International Reading Speed Texts IReST. , 2012, Investigative ophthalmology & visual science.
[4] Butler W. Lampson. Privacy and securityUsable security , 2009, Commun. ACM.
[5] M. Angela Sasse,et al. A stealth approach to usable security: helping IT security managers to identify workable security solutions , 2010, NSPW '10.
[6] Butler W. Lampson,et al. Usable Security: How to Get It , 2009 .
[7] Simson L. Garfinkel,et al. Usable Security: History, Themes, and Challenges , 2014, Usable Security: History, Themes, and Challenges.
[8] M. Angela Sasse,et al. Users are not the enemy , 1999, CACM.
[9] Steven Furnell,et al. A framework for reporting and dealing with end-user security policy compliance , 2019, Inf. Comput. Secur..
[10] Cormac Herley,et al. So long, and no thanks for the externalities: the rational rejection of security advice by users , 2009, NSPW '09.