Investigating an appropriate design for personal firewalls
暂无分享,去创建一个
Kirstie Hawkey | Konstantin Beznosov | Fahimeh Raja | Kellogg S. Booth | K. Booth | K. Hawkey | K. Beznosov | F. Raja
[1] Kirstie Hawkey,et al. Revealing hidden context: improving mental models of personal firewall users , 2009, SOUPS.
[2] M. Sandelowski. Focus on Research Methods Whatever Happened to Qualitative Description? , 2022 .
[3] John Wack,et al. Guidelines on Firewalls and Firewall Policy , 2002 .
[4] W. Keith Edwards,et al. Security automation considered harmful? , 2008, NSPW '07.
[5] Nahid Shahmehri,et al. Usability and Security of Personal Firewalls , 2007, SEC.
[6] W. Keith Edwards,et al. Sesame: informing user security decisions with system visualization , 2008, CHI.
[7] Lorrie Faith Cranor,et al. You've been warned: an empirical study of the effectiveness of web browser phishing warnings , 2008, CHI.
[8] Paul Dourish,et al. Security in the wild: user strategies for managing security as an everyday, practical problem , 2004, Personal and Ubiquitous Computing.
[9] Lorrie Faith Cranor,et al. Decision strategies and susceptibility to phishing , 2006, SOUPS '06.
[10] Jan H. P. Eloff,et al. Security and human computer interfaces , 2003, Comput. Secur..
[11] Sunil Hazari. Perceptions of End-Users on the Requirements in Personal Firewall Software: An Exploratory Study , 2005, J. Organ. End User Comput..