Security user studies: methodologies and best practices
暂无分享,去创建一个
[1] Helen Nissenbaum,et al. Users' conceptions of web security: a comparative study , 2002, CHI Extended Abstracts.
[2] Min Wu,et al. Web wallet: preventing phishing attacks by revealing user intentions , 2006, SOUPS '06.
[3] Edward W. Felten,et al. Password management strategies for online accounts , 2006, SOUPS '06.
[4] Paul Dourish,et al. Security in the wild: user strategies for managing security as an everyday, practical problem , 2004, Personal and Ubiquitous Computing.
[5] Markus Jakobsson,et al. Social phishing , 2007, CACM.
[6] J. Doug Tygar,et al. Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 , 1999, USENIX Security Symposium.
[7] Lorrie Faith Cranor,et al. Power strips, prophylactics, and privacy, oh my! , 2006, SOUPS '06.
[8] Lorrie Faith Cranor,et al. Decision strategies and susceptibility to phishing , 2006, SOUPS '06.
[9] Andrew S. Patrick,et al. HCI and security systems , 2003, CHI Extended Abstracts.
[10] Kori Inkpen Quinn,et al. Gathering evidence: use of visual security cues in web browsers , 2005, Graphics Interface.
[11] Min Wu,et al. Do security toolbars actually prevent phishing attacks? , 2006, CHI.
[12] Edward W. Felten,et al. Secrecy, flagging, and paranoia: adoption criteria in encrypted email , 2006, CHI.