Basing Cybersecurity Training on User Perceptions
暂无分享,去创建一个
Yee-Yin Choong | Mary Frances Theofanos | Brian Stanton | Brian C. Stanton | Susanne Furman | M. Theofanos | S. Furman | Yee-Yin Choong
[1] Mary Beth Rosson,et al. Looking for trouble: understanding end-user security management , 2007, CHIMIT '07.
[2] Paul Dourish,et al. Security in the wild: user strategies for managing security as an everyday, practical problem , 2004, Personal and Ubiquitous Computing.
[3] P. Pavlou,et al. Perceived Information Security, Financial Liability and Consumer Trust in Electronic Commerce Transactions , 2002 .
[4] Dan Jong Kim,et al. Revisiting the role of web assurance seals in consumer trust , 2004, ICEC '04.
[5] Ken Bain,et al. What the Best College Teachers Do , 2004 .
[6] Daniel Kahneman,et al. Availability: A heuristic for judging frequency and probability , 1973 .
[7] Christian End,et al. Unrealistic optimism in internet events , 2007, Comput. Hum. Behav..
[8] L. Jean Camp,et al. Mental Models of Computer Security Risks , 2007, WEIS.
[9] D. Gentner,et al. Cultural models in language and thought: How people construct mental models , 1987 .
[10] Alan J. Dubinsky,et al. Effect of brand name on consumers' risk perceptions of online shopping , 2004 .
[11] Rick Wash,et al. Organization Interfaces—collaborative computing General Terms , 2022 .
[12] Paul Kearney,et al. Human vulnerabilities in security systems , 2007 .
[13] David M. Szymanski,et al. E-satisfaction: an initial examination , 2000 .
[14] J. Hardy. What the Best College Teachers Do , 2007 .
[15] Scott Flinn,et al. User Perceptions of Privacy and Security on the Web , 2005, PST.