Symbolism in Computer Security Warnings: Signal Icons & Signal Words
暂无分享,去创建一个
Azman Samsudin | Manmeet Mahinderjit Singh | Zarul Fitri Zaaba | Nur Farhana Samsudin | A. Samsudin | N. Samsudin | M. Singh | Z. Zaaba
[1] Cristian Bravo-Lillo. Improving Computer Security Dialogs: An Exploration of Attention and Habituation , 2014 .
[2] Zarul Fitri Zaaba,et al. A study on improving security warnings , 2014, The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M).
[3] Zarul Fitri Zaaba,et al. Examination on Usability Issues of Security Warning Dialogs , 2015 .
[4] Ingoo Han,et al. Security threats to Internet: a Korean multi-industry investigation , 2001, Inf. Manag..
[5] Steven Hsu,et al. A brick wall, a locked door, and a bandit: a physical security metaphor for firewall warnings , 2011, SOUPS.
[6] Kat Krol,et al. Don't work. Can't work? Why it's time to rethink security warnings , 2012, 2012 7th International Conference on Risks and Security of Internet and Systems (CRiSIS).
[7] Steven Furnell,et al. Considering the Usability of End-User Security Software , 2006, SEC.
[8] Evie McCrum-Gardner,et al. Which is the correct statistical test to use? , 2008, The British journal of oral & maxillofacial surgery.
[9] Lorrie Faith Cranor,et al. You've been warned: an empirical study of the effectiveness of web browser phishing warnings , 2008, CHI.
[10] Kori Inkpen Quinn,et al. Gathering evidence: use of visual security cues in web browsers , 2005, Graphics Interface.
[11] Wendy A. Rogers,et al. Warning Research: An Integrative Perspective , 2000, Hum. Factors.
[12] Pam J. Mayhew,et al. Users' Awareness of Visible Security Design Flaws , 2016 .
[13] Leah Zhang-Kennedy. Improving Mental Models of Computer Security Through Information Graphics , 2013 .
[14] Jo-Mae B. Maris,et al. Signal Words and Signal Icons in Application Control and Information Technology Exception Messages - Hazard Matching and Habituation Effects , 2006, J. Inf. Syst..
[15] Robert Biddle,et al. Auction Hero: The Design of a Game to Learn and Teach about Computer Security , 2011 .
[16] Lorrie Faith Cranor,et al. Improving Computer Security Dialogs , 2011, INTERACT.
[17] Dimitris Gritzalis,et al. Security Busters: Web browser security vs. rogue sites , 2015, Comput. Secur..